Performance Evaluation

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05
Privacy Enhancing Protocol
Discussion on Protocol Vulnerabilities and Attack Scenarios
Performance Evaluation

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique | Published: 2019-12-03 | Updated: 2020-05-14
Performance Evaluation
Machine Learning
Deep Learning

Deep Probabilistic Models to Detect Data Poisoning Attacks

Authors: Mahesh Subedar, Nilesh Ahuja, Ranganath Krishnan, Ibrahima J. Ndiour, Omesh Tickoo | Published: 2019-12-03
Backdoor Attack
Poisoning Attack
Performance Evaluation

A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay | Published: 2019-12-02
Performance Evaluation
Machine Learning Method
Crime Detection

Fastened CROWN: Tightened Neural Network Robustness Certificates

Authors: Zhaoyang Lyu, Ching-Yun Ko, Zhifeng Kong, Ngai Wong, Dahua Lin, Luca Daniel | Published: 2019-12-02
Performance Evaluation
Deep Learning
Continuous Linear Function

Preserving Patient Privacy while Training a Predictive Model of In-hospital Mortality

Authors: Pulkit Sharma, Farah E Shamout, David A Clifton | Published: 2019-12-01
Privacy Protection
Distributed Learning
Performance Evaluation

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08
Privacy Protection
Efficiency Evaluation
Performance Evaluation

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26
Performance Evaluation
Deep Learning Technology
Image Feature Extraction

Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks

Authors: Alexander Levine, Soheil Feizi | Published: 2019-10-23
Wasserstein Distance
Performance Evaluation
Adversarial Example

Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms

Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29
Adversarial Learning
Performance Evaluation
Adversarial Transferability