Manipulating recommender systems: A survey of poisoning attacks and countermeasures
Recommender systems have become an integral part of online services due to their ability to
help users locate specific information in a sea of data. However, existing studies show that …
help users locate specific information in a sea of data. However, existing studies show that …
A comprehensive survey on heart sound analysis in the deep learning era
Heart sound auscultation has been applied in clinical usage for early screening of
cardiovascular diseases. Due to the high demand for auscultation expertise, automatic …
cardiovascular diseases. Due to the high demand for auscultation expertise, automatic …
Detecting rumours with latency guarantees using massive streaming data
Today's social networks continuously generate massive streams of data, which provide a
valuable starting point for the detection of rumours as soon as they start to propagate …
valuable starting point for the detection of rumours as soon as they start to propagate …
CompressStreamDB: Fine-grained adaptive stream processing without decompression
Stream processing prevails and SQL query on streams has become one of the most popular
application scenarios. For example, in 2021, the global number of active IoT endpoints …
application scenarios. For example, in 2021, the global number of active IoT endpoints …
A survey of privacy-preserving model explanations: Privacy risks, attacks, and countermeasures
As the adoption of explainable AI (XAI) continues to expand, the urgency to address its
privacy implications intensifies. Despite a growing corpus of research in AI privacy and …
privacy implications intensifies. Despite a growing corpus of research in AI privacy and …
Fast-FedUL: a training-free federated unlearning with provable skew resilience
Federated learning (FL) has recently emerged as a compelling machine learning paradigm,
prioritizing the protection of privacy for training data. The increasing demand to address …
prioritizing the protection of privacy for training data. The increasing demand to address …
INEv: in-network evaluation for event stream processing
Complex event processing (CEP) detects situations of interest by evaluating queries over
event streams. Once CEP is used in networked applications, the distribution of query …
event streams. Once CEP is used in networked applications, the distribution of query …
CORE: a complex event recognition engine
M Bucchi, A Grez, A Quintana, C Riveros… - arXiv preprint arXiv …, 2021 - arxiv.org
Complex Event Recognition (CER) systems are a prominent technology for finding user-
defined query patterns over large data streams in real time. CER query evaluation is known …
defined query patterns over large data streams in real time. CER query evaluation is known …
Resource‐adaptive and OOD‐robust inference of deep neural networks on IoT devices
Efficiently executing inference tasks of deep neural networks on devices with limited
resources poses a significant load in IoT systems. To alleviate the load, one innovative …
resources poses a significant load in IoT systems. To alleviate the load, one innovative …
ACER: Accelerating Complex Event Recognition via Two-Phase Filtering under Range Bitmap-Based Indexes
Complex event recognition (CER) refers to identifying specific patterns composed of several
primitive events in event stores. Since full-scanning event stores to identify primitive events …
primitive events in event stores. Since full-scanning event stores to identify primitive events …