Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27 Data Privacy AssessmentPrivacy ProtectionModel Performance Evaluation 2021.04.27 2025.05.28 Literature Database
Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11 Model Performance EvaluationReverse EngineeringAdversarial attack 2021.03.11 2025.05.28 Literature Database
BODAME: Bilevel Optimization for Defense Against Model Extraction Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11 Model Performance EvaluationAdversarial attackSelection and Evaluation of Optimization Algorithms 2021.03.11 2025.05.28 Literature Database
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17 Model Performance EvaluationUser Behavior AnalysisDeep Learning Method 2021.03.11 2025.05.28 Literature Database
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06 Model Performance EvaluationAdversarial attackVulnerability Analysis 2021.03.10 2025.05.28 Literature Database
Proof-of-Learning: Definitions and Practice Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09 Data DependencyModel Performance EvaluationAdversarial attack 2021.03.09 2025.05.28 Literature Database
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09 Model Performance EvaluationDeep Learning MethodWatermark Evaluation 2021.03.09 2025.05.28 Literature Database
Adversarial Information Bottleneck Authors: Penglong Zhai, Shihua Zhang | Published: 2021-02-28 | Updated: 2021-03-03 Model Performance EvaluationAdversarial ExampleAdversarial Training 2021.02.28 2025.05.28 Literature Database
Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24 Model Performance EvaluationTrust Evaluation ModuleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11 WatermarkingModel Performance EvaluationSignal Analysis 2021.02.21 2025.05.28 Literature Database