Literature Database

Privacy preserving Neural Network Inference on Encrypted Data with GPUs

Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26
Model Design
Machine Learning Application
Image Feature Extraction

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25
Model Performance Evaluation
Deep Learning-Based IDS
Research Methodology

Playing it Safe: Adversarial Robustness with an Abstain Option

Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25
Adversarial Learning
Adversarial Example
Adversarial Attack Methods

One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples

Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning

Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25
Blockchain Economics
Model Performance Evaluation
Machine Learning Application

Failure Modes in Machine Learning Systems

Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25
Backdoor Attack
Privacy Violation
Adversarial Example

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Algorithmic Bias in Recidivism Prediction: A Causal Perspective

Authors: Aria Khademi, Vasant Honavar | Published: 2019-11-24
Algorithm
Bias Elimination in Training Data
Bias in Training Data

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology

Universal adversarial examples in speech command classification

Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13
Adversarial Example
Adversarial Attack Methods
Research Methodology