アルゴリズム

“Adversarial Examples” for Proof-of-Learning

Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05
アルゴリズム
トレーニングプロトコル
敵対的サンプル

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Authors: Pengcheng Jiang, Kenji Tei | Published: 2021-08-16 | Updated: 2021-11-02
アルゴリズム
モジュール再構成
計算効率

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09
アルゴリズム
ポイズニング
連合学習

Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems

Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25
アルゴリズム
ハイパーパラメータ最適化
機械学習アルゴリズム

A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee

Authors: Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng | Published: 2021-08-01 | Updated: 2022-09-08
アルゴリズム
ロバスト性
連合学習

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29
アルゴリズム
機械学習アルゴリズム
顔認識システム

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
アルゴリズム
実験的検証
透かしの耐久性

Fully Homomorphically Encrypted Deep Learning as a Service

Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26
アルゴリズム
データ依存性
プライバシー漏洩

Defending SVMs against Poisoning Attacks: the Hardness and DBSCAN Approach

Authors: Hu Ding, Fan Yang, Jiawei Huang | Published: 2020-06-14 | Updated: 2021-02-20
アルゴリズム
ポイズニング
機械学習の基礎

Provably Robust Metric Learning

Authors: Lu Wang, Xuanqing Liu, Jinfeng Yi, Yuan Jiang, Cho-Jui Hsieh | Published: 2020-06-12 | Updated: 2020-12-19
アルゴリズム
敵対的攻撃検出
最適化手法