Fully Homomorphically Encrypted Deep Learning as a Service Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26 2021.07.26 2025.05.28 Literature Database
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 2021.07.26 2025.05.28 Literature Database
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 2021.07.26 2025.05.28 Literature Database
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 2021.07.25 2025.05.28 Literature Database
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16 2021.07.24 2025.05.28 Literature Database
Dynamic detection of mobile malware using smartphone data and machine learning Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23 2021.07.23 2025.05.28 Literature Database
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22 2021.07.22 2025.05.28 Literature Database
Unsupervised Detection of Adversarial Examples with Model Explanations Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22 2021.07.22 2025.05.28 Literature Database
Generative Models for Security: Attacks, Defenses, and Opportunities Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29 2021.07.21 2025.05.28 Literature Database
Secure Random Sampling in Differential Privacy Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24 2021.07.21 2025.05.28 Literature Database