Literature Database

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04
Clustering methods
Poisoning
Attack Method

Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints

Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17
Privacy Protection Method
Privacy Assessment
Deep Learning Method

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang | Published: 2022-10-04
FPGA
Model Design
Performance Evaluation Metrics

Certified Data Removal in Sum-Product Networks

Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04
Data Protection Method
Privacy Protection Method
Privacy Assessment

NeuDep: Neural Binary Memory Dependence Analysis

Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04
Memory Management Method
Model Design
Dynamic Analysis Method

An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks

Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04
DNN IP Protection Method
Performance Evaluation Metrics
Intellectual Property Protection

Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms

Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17
Algorithm
Algorithm Design
Convergence Guarantee

DeltaBound Attack: Efficient decision-based attack in low queries regime

Authors: Lorenzo Rossi | Published: 2022-10-01
DNN IP Protection Method
Model Extraction Attack
Model Design

ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01
Performance Evaluation Metrics
Time-Related Features
Feature Importance Analysis

ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks

Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01
Backdoor Attack
Model Design