Similar Items: A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning
- Fundamental Limitations of Post-Quantum Cryptographic Architectures
- SBN Explorer: An Empirical Study of Cryptographic Boolean Networks
- Cryptographic Registry Provenance: Structural Defense Against Dependency Confusion in AI Package Ecosystems
- HELO Cryptography: A Lightweight Cryptographic System for Enhancing IoT Security in P2P Data Transmission
- Assessing Generalisation Capability of Machine Learning Models for Intrusion Detection
- Privacy Preserving Machine Learning Workflow: from Anonymization to Personalized Differential Privacy Budgets in Federated Learning