Literature Database

Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis

Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20
DNN IP Protection Method
Model Design
Medical Monitoring System

Differentially Private Stochastic Gradient Descent with Low-Noise

Authors: Puyu Wang, Yunwen Lei, Yiming Ying, Ding-Xuan Zhou | Published: 2022-09-09 | Updated: 2023-07-14
Privacy Analysis
Model Design
Convergence Guarantee

Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting

Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09
IC Counterfeiting Prevention Method
Memory Management Method
Machine Learning

A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning

Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04
DNN IP Protection Method
Privacy Analysis
Model Design

VulCurator: A Vulnerability-Fixing Commit Detector

Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07
Model Design and Accuracy
Model Design
Vulnerability detection

SAGE: Software-based Attestation for GPU Execution

Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07
Secure Communication Channel
Memory Management Method
Adversarial Attack Detection

Classification Protocols with Minimal Disclosure

Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06
Convergence Guarantee
Multi-Party Computation
Machine Learning Method

Avast-CTU Public CAPE Dataset

Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol | Published: 2022-09-06
Digital Forensics
Model Design and Accuracy
Model Design

RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data

Authors: Chathurika S. Wickramasinghe, Daniel L. Marino, Harindra S. Mavikumbure, Victor Cobilean, Timothy D. Pennington, Benny J. Varghese, Craig Rieger, Milos Manic | Published: 2022-09-05
Model Design
Intrusion Detection System
Adversarial Attack Detection

“Is your explanation stable?”: A Robustness Evaluation Framework for Feature Attribution

Authors: Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang | Published: 2022-09-05
XAI (Explainable AI)
Robust explainability
Robust Classification