Fully Homomorphically Encrypted Deep Learning as a Service

Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26

Wavelet Selection and Employment for Side-Channel Disassembly

Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25

Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them

Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16

Dynamic detection of mobile malware using smartphone data and machine learning

Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22

Unsupervised Detection of Adversarial Examples with Model Explanations

Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22

Generative Models for Security: Attacks, Defenses, and Opportunities

Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29

Secure Random Sampling in Differential Privacy

Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24