Literature Database

Hardware Trojan Detection Using Controlled Circuit Aging

Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami | Published: 2020-04-06 | Updated: 2020-04-21
Trojan Detection
Hardware Design
Durability Issue

Embedding Java Classes with code2vec: Improvements from Variable Obfuscation

Authors: Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay | Published: 2020-04-06
Code Embedding Method
Code Obfuscation
Dataset Analysis

PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks

Authors: Kalikinkar Mandal, Guang Gong | Published: 2020-04-05
Privacy Protection Method
Linear Regression
Federated Learning

Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks

Authors: Di Gao, Cheng Zhuo | Published: 2020-04-05
Privacy Issues
Information-Theoretic Privacy
Optimization Problem

Differential 3D Facial Recognition: Adding 3D to Your State-of-the-Art 2D Method

Authors: J. Matias Di Martino, Fernando Suzacq, Mauricio Delbracio, Qiang Qiu, Guillermo Sapiro | Published: 2020-04-03
3D Feature Extraction
Robustness Analysis
Face Recognition

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01
Poisoning
Attack Evaluation
Defense Method

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01
Malware Detection Method
Machine Learning Application
Generative Model

MetaPoison: Practical General-purpose Clean-label Data Poisoning

Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21
Backdoor Attack
Poisoning
Adversarial Example

Information Leakage in Embedding Models

Authors: Congzheng Song, Ananth Raghunathan | Published: 2020-03-31 | Updated: 2020-08-19
Privacy Protection Method
Privacy Issues
Membership Inference

Differentially Private Naive Bayes Classifier using Smooth Sensitivity

Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19
Privacy Protection Method
Machine Learning Application
Computational Efficiency