SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural Networks Authors: Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong | Published: 2021-04-02 | Updated: 2022-05-16 2021.04.02 2025.05.28 Literature Database
Adversarial Attacks and Defenses for Speech Recognition Systems Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31 2021.03.31 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 2021.03.31 2025.05.28 Literature Database
Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31 2021.03.31 2025.05.28 Literature Database
Statistical inference for individual fairness Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 2021.03.30 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
MISA: Online Defense of Trojaned Models using Misattributions Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23 2021.03.29 2025.05.28 Literature Database
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29 2021.03.29 2025.05.28 Literature Database