Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 2021.03.07 2025.05.28 Literature Database
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11 2021.03.07 2025.05.28 Literature Database
Utilising Flow Aggregation to Classify Benign Imitating Attacks Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06 2021.03.06 2025.05.28 Literature Database
MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05 2021.03.05 2025.05.28 Literature Database
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05 2021.03.05 2025.05.28 Literature Database
Efficient Encrypted Inference on Ensembles of Decision Trees Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05 2021.03.05 2025.05.28 Literature Database
Quantifying identifiability to choose and audit $ε$ in differentially private deep learning Authors: Daniel Bernau, Günther Eibl, Philip W. Grassal, Hannah Keller, Florian Kerschbaum | Published: 2021-03-04 | Updated: 2021-07-20 2021.03.04 2025.05.28 Literature Database
Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03 2021.03.03 2025.05.28 Literature Database
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07 2021.03.03 2025.05.28 Literature Database
Malware Classification with Word Embedding Features Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03 2021.03.03 2025.05.28 Literature Database