Alert button
Picture for James Joshi

James Joshi

Alert button

Privacy-Preserving Machine Learning: Methods, Challenges and Directions

Add code
Bookmark button
Alert button
Aug 10, 2021
Runhua Xu, Nathalie Baracaldo, James Joshi

Figure 1 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 2 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 3 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Figure 4 for Privacy-Preserving Machine Learning: Methods, Challenges and Directions
Viaarxiv icon

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

Add code
Bookmark button
Alert button
May 18, 2021
Leila Karimi, Mai Abdelhakim, James Joshi

Figure 1 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 2 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 3 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Figure 4 for Adaptive ABAC Policy Learning: A Reinforcement Learning Approach
Viaarxiv icon

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data

Add code
Bookmark button
Alert button
Mar 05, 2021
Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig

Figure 1 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 2 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 3 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Figure 4 for FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data
Viaarxiv icon

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets

Add code
Bookmark button
Alert button
Dec 18, 2020
Runhua Xu, James Joshi, Chao Li

Figure 1 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 2 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 3 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Figure 4 for NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets
Viaarxiv icon

An Automatic Attribute Based Access Control Policy Extraction from Access Logs

Add code
Bookmark button
Alert button
Mar 17, 2020
Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim

Figure 1 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 2 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 3 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Figure 4 for An Automatic Attribute Based Access Control Policy Extraction from Access Logs
Viaarxiv icon