Privacy preserving Neural Network Inference on Encrypted Data with GPUs Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26 Model DesignMachine Learning ApplicationImage Feature Extraction 2019.11.26 2025.05.28 Literature Database
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25 Model Performance EvaluationDeep Learning-Based IDSResearch Methodology 2019.11.25 2025.05.28 Literature Database
Playing it Safe: Adversarial Robustness with an Abstain Option Authors: Cassidy Laidlaw, Soheil Feizi | Published: 2019-11-25 Adversarial LearningAdversarial ExampleAdversarial Attack Methods 2019.11.25 2025.05.28 Literature Database
One Man’s Trash is Another Man’s Treasure: Resisting Adversarial Examples by Adversarial Examples Authors: Chang Xiao, Changxi Zheng | Published: 2019-11-25 | Updated: 2019-11-27 Adversarial ExampleAdversarial Attack MethodsEffectiveness Analysis of Defense Methods 2019.11.25 2025.05.28 Literature Database
Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25 Blockchain EconomicsModel Performance EvaluationMachine Learning Application 2019.11.25 2025.05.28 Literature Database
Failure Modes in Machine Learning Systems Authors: Ram Shankar Siva Kumar, David O Brien, Kendra Albert, Salomé Viljöen, Jeffrey Snover | Published: 2019-11-25 Backdoor AttackPrivacy ViolationAdversarial Example 2019.11.25 2025.05.28 Literature Database
Adversarial Attack with Pattern Replacement Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.25 2025.05.28 Literature Database
Algorithmic Bias in Recidivism Prediction: A Causal Perspective Authors: Aria Khademi, Vasant Honavar | Published: 2019-11-24 AlgorithmBias Elimination in Training DataBias in Training Data 2019.11.24 2025.05.28 Literature Database
Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.23 2025.05.28 Literature Database
Universal adversarial examples in speech command classification Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13 Adversarial ExampleAdversarial Attack MethodsResearch Methodology 2019.11.22 2025.05.28 Literature Database