Performance Evaluation

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
Performance Evaluation
Machine Learning Application
Anomaly Detection Method

Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel

Authors: Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng | Published: 2021-09-15
GPU Vulnerability
Membership Inference
Performance Evaluation

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06
Data Generation
Performance Evaluation
Adversarial attack

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Authors: Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No | Published: 2021-06-14
Differential Privacy
Performance Evaluation
Encryption Technology

Adversarial Example Detection for DNN Models: A Review and Experimental Comparison

Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07
Performance Evaluation
Attack Scenario Analysis
Adversarial Example Detection

Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions

Authors: Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li | Published: 2021-04-22
Performance Evaluation
Adversarial Example Detection
Untargeted Toxicity Attack

Generating Black-Box Adversarial Examples in Sparse Domain

Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang | Published: 2021-01-22 | Updated: 2021-10-15
Performance Evaluation
Adversarial Example
Adversarial attack

Membership Inference Attack on Graph Neural Networks

Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18
Membership Inference
Performance Evaluation
Defense Effectiveness Analysis

Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators

Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14
Performance Evaluation
Machine Learning Method
Generative Adversarial Network

Active Learning Under Malicious Mislabeling and Poisoning Attacks

Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02
Backdoor Attack
Poisoning
Performance Evaluation