The importance of feature preprocessing for differentially private linear optimization Authors: Ziteng Sun, Ananda Theertha Suresh, Aditya Krishna Menon | Published: 2023-07-19 | Updated: 2024-02-19 2023.07.19 2025.04.03 文献データベース
Rethinking Backdoor Attacks Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19 2023.07.19 2025.04.03 文献データベース
Eliminating Label Leakage in Tree-Based Vertical Federated Learning Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22 2023.07.19 2025.04.03 文献データベース
Application of BadNets in Spam Filters Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18 2023.07.18 2025.04.03 文献データベース
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18 2023.07.18 2025.04.03 文献データベース
Discretization-based ensemble model for robust learning in IoT Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18 2023.07.18 2025.04.03 文献データベース
Privacy-preserving patient clustering for personalized federated learning Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17 2023.07.17 2025.04.03 文献データベース
G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts Authors: Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar | Published: 2023-07-17 2023.07.17 2025.04.03 文献データベース
Metadata-based Malware Detection on Android using Machine Learning Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17 2023.07.17 2025.04.03 文献データベース
Hidden Markov Models with Random Restarts vs Boosting for Malware Detection Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17 2023.07.17 2025.04.03 文献データベース