Robustification of deep net classifiers by key based diversified aggregation with pre-filtering Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14 Secure AggregationPerformance EvaluationAttack Type 2019.05.14 2025.05.28 Literature Database
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12 Performance EvaluationMachine Learning TechnologyMulti-Sensor Defense 2019.05.12 2025.05.28 Literature Database
ECG Identification under Exercise and Rest Situations via Various Learning Methods Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11 Signal Processing TechniquesPerformance EvaluationTime Series Analysis 2019.05.11 2025.05.28 Literature Database
Conditionals in Homomorphic Encryption and Machine Learning Applications Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09 Privacy AssurancePerformance EvaluationCryptography 2018.10.29 2025.05.28 Literature Database
Evading classifiers in discrete domains with provable optimality guarantees Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | Published: 2018-10-25 | Updated: 2019-07-01 Certified RobustnessPerformance EvaluationAdversarial Learning 2018.10.25 2025.05.28 Literature Database
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection Authors: Zilong Lin, Yong Shi, Zhi Xue | Published: 2018-09-06 | Updated: 2022-05-08 Model DoSPerformance EvaluationAdversarial Learning 2018.09.06 2025.05.28 Literature Database
HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04 Robustness Improvement MethodPerformance EvaluationAdversarial Example Detection 2018.09.04 2025.05.28 Literature Database
Machine Learning Methods for Network Intrusion Detection Authors: Mouhammad Alkasassbeh, Mohammad Almseidin | Published: 2018-09-01 Dataset evaluationPerformance EvaluationFeature Engineering 2018.09.01 2025.05.28 Literature Database
Efficient ConvNets for Analog Arrays Authors: Malte J. Rasch, Tayfun Gokmen, Mattia Rigotti, Wilfried Haensch | Published: 2018-07-03 AlgorithmPerformance Evaluation 2018.07.03 2025.05.28 Literature Database
Stochastic Layer-Wise Precision in Deep Neural Networks Authors: Griffin Lacey, Graham W. Taylor, Shawki Areibi | Published: 2018-07-03 AlgorithmPerformance EvaluationQuantum Classifier 2018.07.03 2025.05.28 Literature Database