no code implementations • 29 Oct 2021 • Gabriele Costa
By means of a number of examples, we show that our protocols adequately model the engagement of the two parties.
no code implementations • 21 Apr 2021 • Gabriele Costa, Fabio Pinelli, Simone Soderi, Gabriele Tolomei
Although the effect of the model poisoning is negligible to other participants, and does not alter the overall model performance, it can be observed by a malicious receiver and used to transmit a single bit.
1 code implementation • 26 Nov 2020 • Gabriele Costa, Andrea Valenza
Even worse, vulnerabilities may manifest only in exceptional circumstances that do not occur in the normal operation of the application.
Cryptography and Security Symbolic Computation