Literature Database

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte | Published: 2022-04-19 | Updated: 2022-04-21
Application of AI/ML Technologies
Challenges in Analog IC Design
Design Optimization Methods

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
Algorithm Design
Trojan Detection
Machine Learning Method

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18
Backdoor Attack
Membership Inference
Defense Method

Exploiting Multiple EEG Data Domains with Adversarial Learning

Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16
Dataset evaluation
Machine Learning Method
Generative Adversarial Network

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16
Privacy Enhancing Technology
Cryptographic Protocol
Machine Learning Method

Just Fine-tune Twice: Selective Differential Privacy for Large Language Models

Authors: Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu | Published: 2022-04-15 | Updated: 2022-10-27
Privacy Enhancing Technology
Machine Learning Application
Secret Detector

Investigating Positive and Negative Qualities of Human-in-the-Loop Optimization for Designing Interaction Techniques

Authors: Liwei Chan, Yi-Chi Liao, George B. Mo, John J. Dudley, Chun-Lien Cheng, Per Ola Kristensson, Antti Oulasvirta | Published: 2022-04-15
Human-in-the-Loop
Bayesian Optimization
Optimization Problem

Finding MNEMON: Reviving Memories of Node Embeddings

Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29
Algorithm Design
Dataset evaluation
evaluation metrics

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic | Published: 2022-04-14
Algorithm Design
Data Extraction and Analysis
Machine Learning Application