DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30 DNN IP Protection MethodSecurity AssurancePrivacy Risk Management 2022.06.30 2025.05.28 Literature Database
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 Evaluation Methods for PUFSecurity AssuranceTraining Protocol 2022.06.02 2025.05.28 Literature Database
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27 Security AssuranceTrojan DetectionFeature Extraction Method 2022.05.27 2025.05.28 Literature Database
Spoofing Generalization: When Can’t You Trust Proprietary Models? Authors: Ankur Moitra, Elchanan Mossel, Colin Sandon | Published: 2021-06-15 | Updated: 2022-03-23 Security AssuranceSignature Scheme AttackComputational Complexity 2021.06.15 2025.05.28 Literature Database
Towards Memory Safe Python Enclave for Security Sensitive Computation Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12 Security AssurancePrivacy AssessmentVulnerability Assessment Method 2020.05.12 2025.05.28 Literature Database
Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices Authors: Lambert T. Leong, Sean Wiere | Published: 2020-04-22 Security AssuranceRole of Machine LearningFeature Engineering 2020.04.22 2025.05.28 Literature Database
Scalable and Secure Architecture for Distributed IoT Systems Authors: Najmeddine Dhieb, Hakim Ghazzai, Hichem Besbes, Yehia Massoud | Published: 2020-04-20 Security AssuranceMalware ClassificationRole of Machine Learning 2020.04.20 2025.05.28 Literature Database
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10 Security AssurancePrivacy ProtectionPerformance Evaluation 2019.07.24 2025.05.28 Literature Database