Mitigating Gradient Inversion Attacks in Federated Learning with Frequency Transformation

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (28. : 2023 : Den Haag) Computer security ; Part 2: CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AL, and SECAI
1. Verfasser: Palihawadana, Chamath (VerfasserIn)
Weitere Verfasser: Wiratunga, Nirmalie (VerfasserIn), Kalutarage, Harsha (VerfasserIn), Wijekoon, Anjana (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2024
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
WASP 2023 2024
A Methodology for Cybersecurity Risk Assessment in Supply Chains 2024 Gokkaya, Betul
User Behavior Analysis for Malware Detection 2024 Dumitrasc, Valentina
Single-Server Batch Delegation of Variable-Input Pairings with Unbounded Client Lifetime 2024 Crescenzo, Giovanni Di
Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided Fuzzing 2024 Maugeri, Marcello
DNS Dependencies as an Expression of the Digital Divide: The Example of Australia 2024 Nazemi, Niousha
Verifiable Fairness: Privacy–preserving Computation of Fairness for Machine Learning Systems 2024 Toreini, Ehsan
Can Inputs’ Reconstruction Information Be Coded into Machine Learning Model’s Outputs? 2024 Iwahana, Kazuki
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing 2024 Gibert, Daniel
Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture Clustering 2024 Hong, Xin
SECAL 2023 2024
PriST-AI 2023 2024
Balancing XAI with Privacy and Security Considerations 2024 Spartalis, Christoforos N.
C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous Driving 2024 Abdelsalam, Mohamed
Firmware-Based DoS Attacks in Wireless Sensor Network 2024 Lau, Phi Tuong
Toward Next-Generation Cyber Range: A Comparative Study of Training Platforms 2024 Grimaldi, Alexandre
Introducing Distributed Ledger Security into System Specifications with the Isabelle RR-Cycle 2024 Kammüller, Florian
Execution at RISC: Stealth JOP Attacks on RISC-V Applications 2024 Buckwell, Loïc
Modeling Obfuscation Stealth Through Code Complexity 2024 Schrittwieser, Sebastian
FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAI 2024 Senanayake, Janaka
Alle Artikel auflisten