The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …
neural network architecture is capable of processing graph structured data and bridges the …
A review on deep learning techniques for IoT data
Continuous growth in software, hardware and internet technology has enabled the growth of
internet-based sensor tools that provide physical world observations and data …
internet-based sensor tools that provide physical world observations and data …
Boundary unlearning: Rapid forgetting of deep networks via shifting the decision boundary
The practical needs of the" right to be forgotten" and poisoned data removal call for efficient
machine unlearning techniques, which enable machine learning models to unlearn, or to …
machine unlearning techniques, which enable machine learning models to unlearn, or to …
A comprehensive review on deep learning algorithms: Security and privacy issues
Abstract Machine Learning (ML) algorithms are used to train the machines to perform
various complicated tasks that begin to modify and improve with experiences. It has become …
various complicated tasks that begin to modify and improve with experiences. It has become …
Label-only model inversion attacks via knowledge transfer
In a model inversion (MI) attack, an adversary abuses access to a machine learning (ML)
model to infer and reconstruct private training data. Remarkable progress has been made in …
model to infer and reconstruct private training data. Remarkable progress has been made in …
Egia: An external gradient inversion attack in federated learning
Federated learning (FL) has achieved state-of-the-art performance in distributed learning
tasks with privacy requirements. However, it has been discovered that FL is vulnerable to …
tasks with privacy requirements. However, it has been discovered that FL is vulnerable to …
A detailed survey on federated learning attacks and defenses
HS Sikandar, H Waheed, S Tahir, SUR Malik… - Electronics, 2023 - mdpi.com
A traditional centralized method of training AI models has been put to the test by the
emergence of data stores and public privacy concerns. To overcome these issues, the …
emergence of data stores and public privacy concerns. To overcome these issues, the …
Deep learning for iris recognition: A survey
In this survey, we provide a comprehensive review of more than 200 articles, technical
reports, and GitHub repositories published over the last 10 years on the recent …
reports, and GitHub repositories published over the last 10 years on the recent …
Privacy leakage on dnns: A survey of model inversion attacks and defenses
Deep Neural Networks (DNNs) have revolutionized various domains with their exceptional
performance across numerous applications. However, Model Inversion (MI) attacks, which …
performance across numerous applications. However, Model Inversion (MI) attacks, which …
Prevention of cyber security with the internet of things using particle swarm optimization
HA Alterazi, PR Kshirsagar, H Manoharan… - Sensors, 2022 - mdpi.com
High security for physical items such as intelligent machinery and residential appliances is
provided via the Internet of Things (IoT). The physical objects are given a distinct online …
provided via the Internet of Things (IoT). The physical objects are given a distinct online …