Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 Backdoor AttackModel Architecture 2022.03.04 2025.05.28 Literature Database
A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01 DoS MitigationDataset GenerationModel Architecture 2022.03.01 2025.05.28 Literature Database
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01 Style Reconstruction PenaltyModel ArchitectureSelection and Evaluation of Optimization Algorithms 2022.03.01 2025.05.28 Literature Database
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 Privacy TechniqueModel ArchitectureMachine Learning Application 2021.07.26 2025.05.28 Literature Database
The Influence of Dropout on Membership Inference in Differentially Private Models Authors: Erick Galinkin | Published: 2021-03-16 Data Management SystemModel ArchitectureQuantification of Uncertainty 2021.03.16 2025.05.28 Literature Database
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 CybersecurityModel ArchitectureDeep Learning Technology 2021.03.12 2025.05.28 Literature Database
Bridging the Gap Between Adversarial Robustness and Optimization Bias Authors: Fartash Faghri, Sven Gowal, Cristina Vasconcelos, David J. Fleet, Fabian Pedregosa, Nicolas Le Roux | Published: 2021-02-17 | Updated: 2021-06-07 Model ArchitectureAdversarial ExampleAdversarial Training 2021.02.17 2025.05.28 Literature Database
Certifiably Robust Variational Autoencoders Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23 WatermarkingData GenerationModel Architecture 2021.02.15 2025.05.28 Literature Database
Efficient Certified Defenses Against Patch Attacks on Image Classifiers Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08 WatermarkingModel ArchitectureAdversarial Training 2021.02.08 2025.05.28 Literature Database