Federated learning enables collaborative training of machine learning mo...
Federated Learning (FL) has become very popular since it enables clients...
Recently, researchers have successfully employed Graph Neural Networks (...
Backdoor attacks have been demonstrated as a security threat for machine...
Split learning is a collaborative learning design that allows several
pa...
Deep neural networks (DNNs) have achieved excellent results in various t...
Boolean functions are mathematical objects with numerous applications in...
Deep learning achieves outstanding results in many machine learning task...
Deep learning models achieve excellent performance in numerous machine
l...
Boolean functions are mathematical objects used in diverse domains and h...
S-boxes are an important primitive that help cryptographic algorithms to...
The design of binary error-correcting codes is a challenging optimizatio...
A backdoor attack places triggers in victims' deep learning models to en...
Membership Inference Attacks (MIAs) infer whether a data point is in the...
Fuzzing is an automated software testing technique broadly adopted by th...
Graph Neural Networks (GNNs), inspired by Convolutional Neural Networks
...
Federated Learning (FL) emerges from the privacy concerns traditional ma...
Outsourced training and machine learning as a service have resulted in n...
Finding balanced, highly nonlinear Boolean functions is a difficult prob...
Finding Boolean functions suitable for cryptographic primitives is a com...
Evolutionary algorithms have been successfully applied to attacking
Phys...
We present a construction of partial spread bent functions using subspac...
Advances in Machine Learning (ML) and its wide range of applications boo...
Combinatorial designs provide an interesting source of optimization prob...
Graph Neural Networks (GNNs) have achieved promising performance in vari...
Automated Teller Machines (ATMs) represent the most used system for
with...
Deep neural networks represent a powerful option for many real-world
app...
Reversible Cellular Automata (RCA) are a particular kind of shift-invari...
This paper investigates the influence of genotype size on evolutionary
a...
Backdoor attacks represent a serious threat to neural network models. A
...
Genetic programming is an often-used technique for symbolic regression:
...
Tasks related to Natural Language Processing (NLP) have recently been th...
We investigate the use of Genetic Programming (GP) as a convolutional
pr...
Problems and their solutions of the Fifth International Students' Olympi...
Substitution Boxes (S-boxes) are nonlinear objects often used in the des...
Machine learning has become mainstream across industries. Numerous examp...
Mathematical problems and their solutions of the Fourth International
St...