Performance Evaluation

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23
Performance Evaluation
Phishing Detection
Poisoning

Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks

Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23
Data Preprocessing
Performance Evaluation
Classification Pattern Analysis

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
Performance Evaluation
Threat Model
Watermarking Technology

Reaching Data Confidentiality and Model Accountability on the CalTrain

Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07
Trigger Detection
Performance Evaluation
Federated Learning

Three Tools for Practical Differential Privacy

Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07
Hyperparameter Optimization
Performance Evaluation
Differential Privacy

When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection

Authors: Xiangyun Tang, Liehuang Zhu, Meng Shen, Xiaojiang Du | Published: 2018-12-06
Performance Evaluation
Privacy Protection
Differential Privacy

A lightweight MapReduce framework for secure processing with SGX

Authors: Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, Marcelo Pasin | Published: 2017-05-16
Data-Driven Clustering
Performance Evaluation
Privacy-Preserving Algorithm