Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Blockchain-based federated learning for securing internet of things: A comprehensive survey
The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering
significant advantages in agility, responsiveness, and potential environmental benefits. The …
significant advantages in agility, responsiveness, and potential environmental benefits. The …
Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
Trustworthy llms: a survey and guideline for evaluating large language models' alignment
Y Liu, Y Yao, JF Ton, X Zhang, R Guo, H Cheng… - ar**, H Bauermeister, H Dröge… - Advances in neural …, 2020 - proceedings.neurips.cc
The idea of federated learning is to collaboratively train a neural network on a server. Each
user receives the current weights of the network and in turns sends parameter updates …
user receives the current weights of the network and in turns sends parameter updates …
When the curious abandon honesty: Federated learning is not private
In federated learning (FL), data does not leave personal devices when they are jointly
training a machine learning model. Instead, these devices share gradients, parameters, or …
training a machine learning model. Instead, these devices share gradients, parameters, or …
Local model poisoning attacks to {Byzantine-Robust} federated learning
In federated learning, multiple client devices jointly learn a machine learning model: each
client device maintains a local model for its local training dataset, while a master device …
client device maintains a local model for its local training dataset, while a master device …
Reconstructing training data with informed adversaries
Given access to a machine learning model, can an adversary reconstruct the model's
training data? This work studies this question from the lens of a powerful informed adversary …
training data? This work studies this question from the lens of a powerful informed adversary …