
-
Privacy and Robustness in Federated Learning: Attacks and Defenses
As data are increasingly being stored in different silos and societies b...
read it
-
Mixup-Transfomer: Dynamic Data Augmentation for NLP Tasks
Mixup is the latest data augmentation technique that linearly interpolat...
read it
-
Federated Model Distillation with Noise-Free Differential Privacy
Conventional federated learning directly averaging model weights is only...
read it
-
A Survey on Text Classification: From Shallow to Deep Learning
Text classification is the most fundamental and essential task in natura...
read it
-
LDP-FL: Practical Private Aggregation in Federated Learning with Local Differential Privacy
Train machine learning models on sensitive user data has raised increasi...
read it
-
Natural Backdoor Attack on Text Data
Deep learning has been widely adopted in natural language processing app...
read it
-
Secure Network Release with Link Privacy
Many data mining and analytical tasks rely on the abstraction of network...
read it
-
Differentially Private Deep Learning with Smooth Sensitivity
Ensuring the privacy of sensitive data used to train modern machine lear...
read it
-
Adv-BERT: BERT is not robust on misspellings! Generating nature adversarial samples on BERT
There is an increasing amount of literature that claims the brittleness ...
read it
-
Target Privacy Preserving for Social Networks
In this paper, we incorporate the realistic scenario of key protection i...
read it
-
Not Just Cloud Privacy: Protecting Client Privacy in Teacher-Student Learning
Ensuring the privacy of sensitive data used to train modern machine lear...
read it
-
Private Deep Learning with Teacher Ensembles
Privacy-preserving deep learning is crucial for deploying deep neural ne...
read it
-
Adversarial Attack and Defense on Graph Data: A Survey
Deep neural networks (DNNs) have been widely applied in various applicat...
read it
-
Private Model Compression via Knowledge Distillation
The soaring demand for intelligent mobile applications calls for deployi...
read it
-
Joint Embedding of Meta-Path and Meta-Graph for Heterogeneous Information Networks
Meta-graph is currently the most powerful tool for similarity search on ...
read it
-
Deep Learning Towards Mobile Applications
Recent years have witnessed an explosive growth of mobile devices. Mobil...
read it
-
Contaminant Removal for Android Malware Detection Systems
A recent report indicates that there is a new malicious app introduced e...
read it
-
Sequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning
With the rapid growth in smartphone usage, more organizations begin to f...
read it