Digital financial services have catalyzed financial inclusion in Africa....
While deep learning (DL) models are state-of-the-art in text and image
d...
Crash fault tolerant (CFT) consensus algorithms are commonly used in
sce...
Data sharing between different parties has become increasingly common ac...
In Federated Learning (FL), accessing private client data incurs
communi...
There are a number of forums where people participate under pseudonyms. ...
The privacy implications of generative adversarial networks (GANs) are a...
Backdoor attacks are a major concern in federated learning (FL) pipeline...
Most permissionless blockchain networks run on peer-to-peer (P2P) networ...
We study the problem of learning generative adversarial networks (GANs) ...
Private set intersection (PSI) allows two mutually-untrusting parties to...
Vector mean estimation is a central primitive in federated analytics. In...
A central question in federated learning (FL) is how to design optimizat...
Abusive language is a massive problem in online social platforms. Existi...
Fringe groups and organizations have a long history of using
euphemisms–...
Credit networks rely on decentralized, pairwise trust relationships
(cha...
We consider strongly convex-concave minimax problems in the federated
se...
Spectral normalization (SN) is a widely-used technique for improving the...
Incentive mechanisms are central to the functionality of permissionless
...
Limited data access is a substantial barrier to data-driven networking
r...
Bitcoin is the first fully decentralized permissionless blockchain proto...
A blockchain is a database of sequential events that is maintained by a
...
Payment channel networks (PCNs) are viewed as one of the most promising
...
Training disentangled representations with generative adversarial networ...
Motivated by applications in blockchains and sensor networks, we conside...
Transaction throughput, confirmation latency and confirmation reliabilit...
Proof-of-stake (PoS) is a promising approach for designing efficient
blo...
With the growing usage of Bitcoin and other cryptocurrencies, many
scala...
Recent work has demonstrated significant anonymity vulnerabilities in
Bi...
Generative adversarial networks (GANs) are innovative techniques for lea...