Threat Assessment in Machine Learning based Systems Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30 2022.06.30 2025.05.28 Literature Database
DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30 2022.06.30 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 2022.06.29 2025.05.28 Literature Database
Private Graph Extraction via Feature Explanations Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02 2022.06.29 2025.05.28 Literature Database
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 2022.06.29 2025.05.28 Literature Database
Approximate Data Deletion in Generative Models Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29 2022.06.29 2025.05.28 Literature Database
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29 2022.06.29 2025.05.28 Literature Database
A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 2022.06.29 2025.05.28 Literature Database
CoAP-DoS: An IoT Network Intrusion Dataset Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29 2022.06.29 2025.05.28 Literature Database
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 2022.06.28 2025.05.28 Literature Database