Privacy and fairness in Federated learning: on the perspective of Tradeoff
Federated learning (FL) has been a hot topic in recent years. Ever since it was introduced,
researchers have endeavored to devise FL systems that protect privacy or ensure fair …
researchers have endeavored to devise FL systems that protect privacy or ensure fair …
Decision trees: from efficient prediction to responsible AI
This article provides a birds-eye view on the role of decision trees in machine learning and
data science over roughly four decades. It sketches the evolution of decision tree research …
data science over roughly four decades. It sketches the evolution of decision tree research …
Continual learning with foundation models: An empirical study of latent replay
Rapid development of large-scale pre-training has resulted in foundation models that can
act as effective feature extractors on a variety of downstream tasks and domains. Motivated …
act as effective feature extractors on a variety of downstream tasks and domains. Motivated …
Gme: Gpu-based microarchitectural extensions to accelerate homomorphic encryption
Fully Homomorphic Encryption (FHE) enables the processing of encrypted data without
decrypting it. FHE has garnered significant attention over the past decade as it supports …
decrypting it. FHE has garnered significant attention over the past decade as it supports …
[HTML][HTML] Privacy-Preserving Techniques in Generative AI and Large Language Models: A Narrative Review
Generative AI, including large language models (LLMs), has transformed the paradigm of
data generation and creative content, but this progress raises critical privacy concerns …
data generation and creative content, but this progress raises critical privacy concerns …
The Effects of Cyber Security Attacks on Data Integrity in AI
R Vadisetty - 2024 International Conference on Intelligent …, 2024 - ieeexplore.ieee.org
The benefits of new technology are becoming increasingly apparent to organisations as
digital transformation continues. However, as technology becomes more widely used …
digital transformation continues. However, as technology becomes more widely used …
Trusted AI in multiagent systems: An overview of privacy and security for distributed learning
Motivated by the advancing computational capacity of distributed end-user equipment (UE),
as well as the increasing concerns about sharing private data, there has been considerable …
as well as the increasing concerns about sharing private data, there has been considerable …
Ethical considerations for responsible data curation
Human-centric computer vision (HCCV) data curation practices often neglect privacy and
bias concerns, leading to dataset retractions and unfair models. HCCV datasets constructed …
bias concerns, leading to dataset retractions and unfair models. HCCV datasets constructed …
[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …
A federated learning-based industrial health prognostics for heterogeneous edge devices using matched feature extraction
Data-driven industrial health prognostics require rich training data to develop accurate and
reliable predictive models. However, stringent data privacy laws and the abundance of edge …
reliable predictive models. However, stringent data privacy laws and the abundance of edge …