Training Data Generation

RareGAN: Generating Samples for Rare Classes

Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20
Active Learning
Trade-off Analysis
Training Data Generation

The Dark Side: Security Concerns in Machine Learning for EDA

Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20
Training Data Generation
Privacy Risk Management
Malicious Client

An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11
Training Data Generation
Adversarial Example
Defense Method

Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29
Training Data Generation
Hardware Trojan Detection
Machine Learning Algorithm

Fooling Adversarial Training with Inducing Noise

Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19
Training Data Generation
Poisoning
Adversarial attack

Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries

Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27
Training Data Generation
Adversarial Example
Defense Effectiveness Analysis

Hidden Trigger Backdoor Attacks

Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21
Training Data Generation
Backdoor Attack
Adversarial attack

NEUZZ: Efficient Fuzzing with Neural Program Smoothing

Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12
Training Data Generation
Program Verification
Model Design and Accuracy

Deep Learning for Launching and Mitigating Wireless Jamming Attacks

Authors: Tugba Erpek, Yalin E. Sagduyu, Yi Shi | Published: 2018-07-03 | Updated: 2018-12-13
Training Data Generation
Adversarial attack
Defense Method