Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Mitigating gradient inversion attacks in federated learning with frequency transformation. (2024)
Conference Proceeding
PALIHAWADANA, C., WIRATUNGA, N., KALUTARAGE, H. and WIJEKOON, A. 2024. Mitigating gradient inversion attacks in federated learning with frequency transformation. In Katsikas, S. et al. (eds.) Computer security: revised selected papers from the proceedings of the International workshops of the 28th European symposium on research in computer security (ESORICS 2023 International Workshops), 25-29 September 2023, The Hague, Netherlands. Lecture notes in computer science, 14399. Cham: Springer [online], part II, pages 750-760. Available from: https://doi.org/10.1007/978-3-031-54129-2_44

Centralised machine learning approaches have raised concerns regarding the privacy of client data. To address this issue, privacy-preserving techniques such as Federated Learning (FL) have emerged, where only updated gradients are communicated instea... Read More about Mitigating gradient inversion attacks in federated learning with frequency transformation..

Reasoning with counterfactual explanations for code vulnerability detection and correction. (2021)
Conference Proceeding
WIJEKOON, A. and WIRATUNGA, N. 2021. Reasoning with counterfactual explanations for code vulnerability detection and correction. In Sani, S. and Kalutarage, H. (eds.) AI and cybersecurity 2021: proceedings of the 2021 Workshop on AI and cybersecurity (AI-Cybersec 2021), co-located with the 41st Specialist Group on Artificial Intelligence international conference on artificial intelligence (SGAI 2021), 14 December 2021, [virtual event]. CEUR workshop proceedings, 3125. Aachen: CEUR-WS [online], pages 1-13. Available from: http://ceur-ws.org/Vol-3125/paper1.pdf

Counterfactual explanations highlight "actionable knowledge" which helps the end-users to understand how a machine learning outcome could be changed to a more desirable outcome. In code vulnerability detection, understanding these "actionable" correc... Read More about Reasoning with counterfactual explanations for code vulnerability detection and correction..