文献データベース

Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy

Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23
データ依存性
プライバシー保護
通信効率

Statistical Feature-based Personal Information Detection in Mobile Network Traffic

Authors: Shuang Zhao, Shuhui Chen, Ziling Wei | Published: 2021-12-23
データ管理システム
プライバシー侵害
静的分析

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22
ポイズニング
敵対的学習
防御手法

Towards Malicious address identification in Bitcoin

Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2021-12-22
データ前処理
不正取引
時間に関連する特徴

Distributed Machine Learning and the Semblance of Trust

Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21
データ管理システム
プライバシー侵害
ポイズニング

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21
イベントトレース分析
メンバーシップ推論
脅威モデル

Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma | Published: 2021-12-21 | Updated: 2022-08-25
ブロックチェーン技術
犯罪行為検出
通信効率

A Theoretical View of Linear Backpropagation and Its Convergence

Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10
モデル設計
収束解析
防御手法

Vulnerability Analysis of the Android Kernel

Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20
メンバーシップ推論
性能評価
脆弱性予測

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey

Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19
バックドア攻撃
プライバシーリスク管理
ポイズニング