In the privacy-utility tradeoff of a model trained on benchmark language...
Data generated at the network edge can be processed locally by leveragin...
We propose Byzantine-robust federated learning protocols with nearly opt...
In this paper, we propose the first secure federated χ^2-test protocol
F...
We prove that 𝔽_p sketch, a well-celebrated streaming algorithm
for freq...
Recent research has confirmed the feasibility of backdoor attacks in dee...
Deep learning techniques have achieved remarkable performance in wide-ra...
Today's massive scale of data collection coupled with recent surges of
c...
In this paper, we present F2ED-Learning, the first federated learning
pr...
Ever since its proposal, differential privacy has become the golden stan...
Causal graph discovery refers to the process of discovering causal relat...
During the past decade, differential privacy has become the gold standar...
The increasing pace of data collection has led to increasing awareness o...
A trojan backdoor is a hidden pattern typically implanted in a deep neur...
The panoramic video is widely used to build virtual reality (VR) and is
...