SOTAVerified

Privacy Preserving

Papers

Showing 11761200 of 2975 papers

TitleStatusHype
FedEval: A Holistic Evaluation Framework for Federated Learning0
FedEval-LLM: Federated Evaluation of Large Language Models on Downstream Tasks with Collective Wisdom0
A Survey of What to Share in Federated Learning: Perspectives on Model Utility, Privacy Leakage, and Communication Efficiency0
Declarative Privacy-Preserving Inference Queries0
FedGAT: A Privacy-Preserving Federated Approximation Algorithm for Graph Attention Networks0
FedGeo: Privacy-Preserving User Next Location Prediction with Federated Learning0
FedGES: A Federated Learning Approach for BN Structure Learning0
A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research0
Federated Learning for Commercial Image Sources0
A synthetic dataset of French electric load curves with temperature conditioning0
FedGNN: Federated Graph Neural Network for Privacy-Preserving Recommendation0
Federated Learning for Clinical Structured Data: A Benchmark Comparison of Engineering and Statistical Approaches0
FedGRec: Dynamic Spatio-Temporal Federated Graph Learning for Secure and Efficient Cross-Border Recommendations0
Cross-device Federated Learning for Mobile Health Diagnostics: A First Study on COVID-19 Detection0
Decentralized Federated Anomaly Detection in Smart Grids: A P2P Gossip Approach0
Federated Learning Empowered by Generative Content0
Decentralized Federated Learning: A Survey on Security and Privacy0
FeDiSa: A Semi-asynchronous Federated Learning Framework for Power System Fault and Cyberattack Discrimination0
Decentralized Graph Neural Network for Privacy-Preserving Recommendation0
FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses0
Federated Learning-Driven Cybersecurity Framework for IoT Networks with Privacy-Preserving and Real-Time Threat Detection Capabilities0
FedLE: Federated Learning Client Selection with Lifespan Extension for Edge IoT Networks0
FedMABA: Towards Fair Federated Learning through Multi-Armed Bandits Allocation0
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer0
A Survey of Secure Computation Using Trusted Execution Environments0
Show:102550
← PrevPage 48 of 119Next →

No leaderboard results yet.