Searched for: subject%3A%22Reconstruction%255C+Attack%22
(1 - 3 of 3)
document
Olatunji, Iyiola E (author), Rathee, Mandeep (author), Funke, Thorben (author), Khosla, M. (author)
Privacy and interpretability are two important ingredients for achieving trustworthy machine learning. We study the interplay of these two aspects in graph machine learning through graph reconstruction attacks. The goal of the adversary here is to reconstruct the graph structure of the training data given access to model explanations. Based on...
conference paper 2023
document
Xu, J. (author), Hong, C. (author), Huang, J. (author), Chen, Lydia Y. (author), Decouchant, Jérémie (author)
Federated learning is a private-by-design distributed learning paradigm where clients train local models on their own data before a central server aggregates their local updates to compute a global model. Depending on the aggregation method used, the local updates are either the gradients or the weights of local learning models, e.g., FedAvg...
conference paper 2023
document
Xu, Jin (author)
Federated learning is a private-by-design distributed learning paradigm where clients train local models on their own data before a central server aggregates their local updates to compute a global model. Depending on the aggregation method used, the local updates are either the gradients or the weights of local learning models. Unfortunately,...
master thesis 2022