Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 2022.06.04 2025.04.03 文献データベース
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 2022.06.02 2025.04.03 文献データベース
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース
Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20 2022.06.01 2025.04.03 文献データベース
Differentially Private Shapley Values for Data Evaluation Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 2022.06.01 2025.04.03 文献データベース
Privacy for Free: How does Dataset Condensation Help Privacy? Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01 2022.06.01 2025.04.03 文献データベース
To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints? Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31 2022.05.31 2025.04.03 文献データベース
Private Federated Submodel Learning with Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31 2022.05.31 2025.04.03 文献データベース
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 2022.05.31 2025.04.03 文献データベース