On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04 Clustering methodsPoisoningAttack Method 2022.10.04 2025.05.28 Literature Database
Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17 Privacy Protection MethodPrivacy AssessmentDeep Learning Method 2022.10.04 2025.05.28 Literature Database
Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang | Published: 2022-10-04 FPGAModel DesignPerformance Evaluation Metrics 2022.10.04 2025.05.28 Literature Database
Certified Data Removal in Sum-Product Networks Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04 Data Protection MethodPrivacy Protection MethodPrivacy Assessment 2022.10.04 2025.05.28 Literature Database
NeuDep: Neural Binary Memory Dependence Analysis Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04 Memory Management MethodModel DesignDynamic Analysis Method 2022.10.04 2025.05.28 Literature Database
An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04 DNN IP Protection MethodPerformance Evaluation MetricsIntellectual Property Protection 2022.10.03 2025.05.28 Literature Database
Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17 AlgorithmAlgorithm DesignConvergence Guarantee 2022.10.03 2025.05.28 Literature Database
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 DNN IP Protection MethodModel Extraction AttackModel Design 2022.10.01 2025.05.28 Literature Database
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01 Performance Evaluation MetricsTime-Related FeaturesFeature Importance Analysis 2022.10.01 2025.05.28 Literature Database
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01 Backdoor AttackModel Design 2022.09.30 2025.05.28 Literature Database