Machine Learning Application

Distributionally Robust Multiclass Classification and Applications in Deep Image Classifiers

Authors: Ruidi Chen, Boran Hao, Ioannis Paschalidis | Published: 2021-09-27 | Updated: 2023-03-25
Robustness
Performance Evaluation
Machine Learning Application

POSSE: Patterns of Systems During Software Encryption

Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24
Software Security
Performance Evaluation
Machine Learning Application

Interpretability in Safety-Critical FinancialTrading Systems

Authors: Gabriel Deza, Adelin Travers, Colin Rowat, Nicolas Papernot | Published: 2021-09-24
Performance Evaluation
Machine Learning Application
Feature Importance Analysis

Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning

Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19
Algorithm
Machine Learning Application
Linear Model

An automatic differentiation system for the age of differential privacy

Authors: Dmitrii Usynin, Alexander Ziller, Moritz Knolle, Andrew Trask, Kritika Prakash, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2022-04-05
Data Privacy Assessment
Privacy Risk Management
Machine Learning Application

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
Performance Evaluation
Machine Learning Application
Anomaly Detection Method

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Machine Learning Application

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02
Privacy Technique
Model Architecture
Machine Learning Application

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26
Hardware Design
Machine Learning Application
Defense Mechanism

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23
Attack Evaluation
Machine Learning Application
Machine Learning Technology