Model Design

Privacy preserving Neural Network Inference on Encrypted Data with GPUs

Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26
Model Design
Machine Learning Application
Image Feature Extraction

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology

Fine-grained Synthesis of Unrestricted Adversarial Examples

Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22
Model Performance Evaluation
Model Design
Adversarial Attack Methods

Adversarial Robustness of Flow-Based Generative Models

Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20
Trade-off Analysis
Model Design
Adversarial Attack Methods

Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory

Authors: Arash Rahnama, Andre T. Nguyen, Edward Raff | Published: 2019-11-12
Model Design
Numerical Stability Issues
Adversarial Example

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18
Poisoning
Model Design
Machine Learning

Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient

Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16
Model Design
Machine Learning Algorithm
Machine Learning Framework

Maximum Principle Based Algorithms for Deep Learning

Authors: Qianxiao Li, Long Chen, Cheng Tai, Weinan E | Published: 2017-10-26 | Updated: 2018-06-02
Model Design
Convergence Property
Multi-Objective Optimization

Malware Detection by Eating a Whole EXE

Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25
Malware Classification
Malware Detection Method
Model Design