Literature Database

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation

Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29
Privacy Leakage
Model Design
Machine Learning Algorithm

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29
Algorithm
Machine Learning Algorithm
Face Recognition System

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
Algorithm
Experimental Validation
Watermark Robustness

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27
Overview of PDF Format
Poisoning
Malware Detection

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26
Poisoning
Attackers and Malicious Devices
Federated Learning

Fully Homomorphically Encrypted Deep Learning as a Service

Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26
Algorithm
Data Dependency
Privacy Leakage

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02
Privacy Technique
Model Architecture
Machine Learning Application

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26
Hardware Design
Machine Learning Application
Defense Mechanism

Wavelet Selection and Employment for Side-Channel Disassembly

Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25
Watermarking
Time-Frequency Analysis
evaluation metrics

Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them

Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16
Role of Machine Learning
Defense Mechanism
High Difficulty Sample