Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution Authors: Yiftach Savransky, Roni Mateless, Gilad Katz | Published: 2021-11-04 Data GenerationPrivacy ProtectionReconstruction Durability 2021.11.04 2025.05.28 Literature Database
Don’t Generate Me: Training Differentially Private Generative Models with Sinkhorn Divergence Authors: Tianshi Cao, Alex Bie, Arash Vahdat, Sanja Fidler, Karsten Kreis | Published: 2021-11-01 | Updated: 2021-11-29 Data GenerationTrade-off AnalysisPrivacy Risk Management 2021.11.01 2025.05.28 Literature Database
Availability Attacks Create Shortcuts Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02 DDoS AttackData GenerationAdversarial Attack Detection 2021.11.01 2025.05.28 Literature Database
A ground-truth dataset of real security patches Authors: Sofia Reis, Rui Abreu | Published: 2021-10-18 Data GenerationData Management SystemAutomated Vulnerability Remediation 2021.10.18 2025.05.28 Literature Database
Infinitely Divisible Noise in the Low Privacy Regime Authors: Rasmus Pagh, Nina Mesing Stausholm | Published: 2021-10-13 | Updated: 2022-03-07 Data GenerationPrivacy ViolationFederated Learning 2021.10.13 2025.05.28 Literature Database
Datasets are not Enough: Challenges in Labeling Network Traffic Authors: Jorge Guerra, Carlos Catania, Eduardo Veas | Published: 2021-10-12 | Updated: 2021-12-30 Challenges of Data LabelingData GenerationRole of Machine Learning 2021.10.12 2025.05.28 Literature Database
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection Authors: Benedikt Holmes, Arthur Drichel, Ulrike Meyer | Published: 2021-10-12 Data GenerationPrivacy ViolationMachine Learning Algorithm 2021.10.12 2025.05.28 Literature Database
Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub | Published: 2021-10-10 Data GenerationAdversarial Attack MethodsPhysical attack 2021.10.10 2025.05.28 Literature Database
Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06 AlgorithmData GenerationPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Mobile authentication of copy detection patterns: how critical is to know fakes? Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 Data GenerationPerformance EvaluationIntellectual Property Protection 2021.10.05 2025.05.28 Literature Database