Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang | Published: 2022-10-04 FPGAModel DesignPerformance Evaluation Metrics 2022.10.04 2025.05.28 Literature Database
NeuDep: Neural Binary Memory Dependence Analysis Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04 Memory Management MethodModel DesignDynamic Analysis Method 2022.10.04 2025.05.28 Literature Database
DeltaBound Attack: Efficient decision-based attack in low queries regime Authors: Lorenzo Rossi | Published: 2022-10-01 DNN IP Protection MethodModel Extraction AttackModel Design 2022.10.01 2025.05.28 Literature Database
ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01 Backdoor AttackModel Design 2022.09.30 2025.05.28 Literature Database
No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy” Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29 Data Protection MethodPrivacy AssessmentModel Design 2022.09.29 2025.05.28 Literature Database
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30 DNN IP Protection MethodModel DesignDeep Learning Method 2022.09.28 2025.05.28 Literature Database
Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation Authors: Qiongxiu Li, Jaron Skovsted Gundersen, Katrine Tjell, Rafal Wisniewski, Mads Græsbøll Christensen | Published: 2022-09-16 Privacy AnalysisModel DesignMulti-Party Computation 2022.09.16 2025.05.28 Literature Database
M^4I: Multi-modal Models Membership Inference Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15 Privacy AnalysisModel DesignDeep Learning Method 2022.09.15 2025.05.28 Literature Database
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 Model DesignAdversarial Attack DetectionDeep Learning Method 2022.09.14 2025.05.28 Literature Database
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 Model Extraction AttackModel DesignDeep Learning Method 2022.09.14 2025.05.28 Literature Database