Backdoor Attacks in Peer-to-Peer Federated Learning Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17 2023.01.23 2025.04.03 文献データベース
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20 2023.01.20 2025.04.03 文献データベース
Towards Understanding How Self-training Tolerates Data Backdoor Poisoning Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20 2023.01.20 2025.04.03 文献データベース
On the Vulnerability of Backdoor Defenses for Federated Learning Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19 2023.01.19 2025.04.03 文献データベース
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13 2023.01.18 2025.04.03 文献データベース
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 2023.01.18 2025.04.03 文献データベース
Using Topological Data Analysis to classify Encrypted Bits Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18 2023.01.18 2025.04.03 文献データベース
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 2023.01.17 2025.04.03 文献データベース
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 2023.01.17 2025.04.03 文献データベース
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15 2023.01.15 2025.04.03 文献データベース