Search

Your search keyword '"Avestimehr, Salman"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Avestimehr, Salman" Remove constraint Author: "Avestimehr, Salman" Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security
25 results on '"Avestimehr, Salman"'

Search Results

1. Federated Learning Privacy: Attacks, Defenses, Applications, and Policy Landscape - A Survey

2. Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation

3. Edge Private Graph Neural Networks with Singular Value Perturbation

4. All Rivers Run to the Sea: Private Learning with Asymmetric Flows

5. Kick Bad Guys Out! Zero-Knowledge-Proof-Based Anomaly Detection in Federated Learning

6. FedSecurity: Benchmarking Attacks and Defenses in Federated Learning and Federated LLMs

7. Secure Federated Learning against Model Poisoning Attacks via Client Filtering

8. The Resource Problem of Using Linear Layer Leakage Attack in Federated Learning

9. LOKI: Large-scale Data Reconstruction Attack against Federated Learning through Model Manipulation

10. FedML-HE: An Efficient Homomorphic-Encryption-Based Privacy-Preserving Federated Learning System

11. Proof-of-Contribution-Based Design for Collaborative Machine Learning on Blockchain

12. Federated Analytics: A survey

13. How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?

14. Secure Federated Clustering

15. 3LegRace: Privacy-Preserving DNN Training over TEEs and GPUs

16. LightSecAgg: a Lightweight and Versatile Design for Secure Aggregation in Federated Learning

17. Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

18. Adaptive Verifiable Coded Computing: Towards Fast, Secure and Private Distributed Machine Learning

19. Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning

20. Info-Commit: Information-Theoretic Polynomial Commitment

21. Coded Merkle Tree: Solving Data Availability Attacks in Blockchains

22. Interactive Verifiable Polynomial Evaluation

23. Coded State Machine -- Scaling State Machine Execution under Byzantine Faults

24. FedMLSecurity: A Benchmark for Attacks and Defenses in Federated Learning and LLMs

25. Secure Aggregation in Federated Learning is not Private: Leaking User Data at Large Scale through Model Modification

Catalog

Books, media, physical & digital resources