Distributionally Robust Multiclass Classification and Applications in Deep Image Classifiers Authors: Ruidi Chen, Boran Hao, Ioannis Paschalidis | Published: 2021-09-27 | Updated: 2023-03-25 RobustnessPerformance EvaluationMachine Learning Application 2021.09.27 2025.05.28 Literature Database
POSSE: Patterns of Systems During Software Encryption Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24 Software SecurityPerformance EvaluationMachine Learning Application 2021.09.24 2025.05.28 Literature Database
Interpretability in Safety-Critical FinancialTrading Systems Authors: Gabriel Deza, Adelin Travers, Colin Rowat, Nicolas Papernot | Published: 2021-09-24 Performance EvaluationMachine Learning ApplicationFeature Importance Analysis 2021.09.24 2025.05.28 Literature Database
Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19 AlgorithmMachine Learning ApplicationLinear Model 2021.09.24 2025.05.28 Literature Database
An automatic differentiation system for the age of differential privacy Authors: Dmitrii Usynin, Alexander Ziller, Moritz Knolle, Andrew Trask, Kritika Prakash, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2022-04-05 Data Privacy AssessmentPrivacy Risk ManagementMachine Learning Application 2021.09.22 2025.05.28 Literature Database
Modern Cybersecurity Solution using Supervised Machine Learning Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15 Performance EvaluationMachine Learning ApplicationAnomaly Detection Method 2021.09.15 2025.05.28 Literature Database
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14 CybersecurityData Extraction and AnalysisMachine Learning Application 2021.09.14 2025.05.28 Literature Database
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 Privacy TechniqueModel ArchitectureMachine Learning Application 2021.07.26 2025.05.28 Literature Database
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 Hardware DesignMachine Learning ApplicationDefense Mechanism 2021.07.26 2025.05.28 Literature Database
Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23 Attack EvaluationMachine Learning ApplicationMachine Learning Technology 2021.07.05 2025.05.28 Literature Database