Private Hierarchical Clustering and Efficient Approximation Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01 Privacy Enhancing TechnologyEncryption TechnologyHierarchical Clustering 2019.04.09 2025.05.28 Literature Database
Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25 Trigger DetectionModel Performance EvaluationEncryption Technology 2018.11.25 2025.05.28 Literature Database
The Taboo Trap: Behavioural Detection of Adversarial Samples Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21 Backdoor DetectionEncryption TechnologyDefense Method 2018.11.18 2025.05.28 Literature Database
Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12 Model EvaluationAdversarial attackEncryption Technology 2018.07.12 2025.05.28 Literature Database
Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12 Malware Detection MethodAdversarial Attack DetectionEncryption Technology 2018.03.12 2025.05.28 Literature Database
Gazelle: A Low Latency Framework for Secure Neural Network Inference Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16 Secure Arithmetic ComputationEncryption TechnologyWatermarking Technology 2018.01.16 2025.05.28 Literature Database
CryptoDL: Deep Neural Networks over Encrypted Data Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14 Differential PrivacyEncryption TechnologyApproximate Calculation 2017.11.14 2025.05.28 Literature Database
Morpheo: Traceable Machine Learning on Hidden data Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17 Privacy Enhancing TechnologyPlatform ArchitectureEncryption Technology 2017.04.17 2025.05.28 Literature Database