Model Architecture

Convolutional Neural Networks for Image Spam Detection

Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02
Model Architecture
Machine Learning
Image Feature Extraction

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04
Backdoor Attack
Model Architecture

A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01
DoS Mitigation
Dataset Generation
Model Architecture

Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01
Style Reconstruction Penalty
Model Architecture
Selection and Evaluation of Optimization Algorithms

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02
Privacy Technique
Model Architecture
Machine Learning Application

The Influence of Dropout on Membership Inference in Differentially Private Models

Authors: Erick Galinkin | Published: 2021-03-16
Data Management System
Model Architecture
Quantification of Uncertainty

Explaining Network Intrusion Detection System Using Explainable AI Framework

Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12
Cybersecurity
Model Architecture
Deep Learning Technology

Bridging the Gap Between Adversarial Robustness and Optimization Bias

Authors: Fartash Faghri, Sven Gowal, Cristina Vasconcelos, David J. Fleet, Fabian Pedregosa, Nicolas Le Roux | Published: 2021-02-17 | Updated: 2021-06-07
Model Architecture
Adversarial Example
Adversarial Training

Certifiably Robust Variational Autoencoders

Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23
Watermarking
Data Generation
Model Architecture

Efficient Certified Defenses Against Patch Attacks on Image Classifiers

Authors: Jan Hendrik Metzen, Maksym Yatsura | Published: 2021-02-08
Watermarking
Model Architecture
Adversarial Training