Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Gaussian differential privacy
In the past decade, differential privacy has seen remarkable success as a rigorous and
practical formalization of data privacy. This privacy definition and its divergence based …
practical formalization of data privacy. This privacy definition and its divergence based …
UVeQFed: Universal vector quantization for federated learning
Traditional deep learning models are trained at a centralized server using data samples
collected from users. Such data samples often include private information, which the users …
collected from users. Such data samples often include private information, which the users …
Frame averaging for invariant and equivariant network design
Many machine learning tasks involve learning functions that are known to be invariant or
equivariant to certain symmetries of the input data. However, it is often challenging to design …
equivariant to certain symmetries of the input data. However, it is often challenging to design …
A perspective on massive random-access
Y Polyanskiy - 2017 IEEE International Symposium on …, 2017 - ieeexplore.ieee.org
This paper discusses the contemporary problem of providing multiple-access (MAC) to a
massive number of uncoordinated users. First, we define a random-access code for K a-user …
massive number of uncoordinated users. First, we define a random-access code for K a-user …
Information-theoretic analysis of generalization capability of learning algorithms
A Xu, M Raginsky - Advances in neural information …, 2017 - proceedings.neurips.cc
We derive upper bounds on the generalization error of a learning algorithm in terms of the
mutual information between its input and output. The bounds provide an information …
mutual information between its input and output. The bounds provide an information …
What's behind the mask: Understanding masked graph modeling for graph autoencoders
The last years have witnessed the emergence of a promising self-supervised learning
strategy, referred to as masked autoencoding. However, there is a lack of theoretical …
strategy, referred to as masked autoencoding. However, there is a lack of theoretical …
The information bottleneck problem and its applications in machine learning
Z Goldfeld, Y Polyanskiy - IEEE Journal on Selected Areas in …, 2020 - ieeexplore.ieee.org
Inference capabilities of machine learning (ML) systems skyrocketed in recent years, now
playing a pivotal role in various aspect of society. The goal in statistical learning is to use …
playing a pivotal role in various aspect of society. The goal in statistical learning is to use …
Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs
Consider a stochastic process being controlled across a communication channel. The
control signal that is transmitted across the control channel can be replaced by a malicious …
control signal that is transmitted across the control channel can be replaced by a malicious …
Securing approximate homomorphic encryption using differential privacy
Recent work of Li and Micciancio (Eurocrypt 2021) has shown that the traditional formulation
of indistinguishability under chosen plaintext attack (IND-CPA) is not adequate to capture …
of indistinguishability under chosen plaintext attack (IND-CPA) is not adequate to capture …
Oversquashing in gnns through the lens of information contraction and graph expansion
The quality of signal propagation in message-passing graph neural networks (GNNs)
strongly influences their expressivity as has been observed in recent works. In particular, for …
strongly influences their expressivity as has been observed in recent works. In particular, for …