MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14 Link Prediction MethodPerformance Evaluation MetricsMachine Learning Method 2021.12.14 2025.05.28 Literature Database
Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06 Medical Monitoring SystemMachine Learning ApplicationMachine Learning Method 2021.12.06 2025.05.28 Literature Database
Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29 Machine Learning ApplicationMachine Learning MethodFeature Engineering 2021.10.29 2025.05.28 Literature Database
A Machine Learning Approach for DDoS Detection on IoT Devices Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28 DDoS AttackData PreprocessingMachine Learning Method 2021.10.28 2025.05.28 Literature Database
Differentially Private Coordinate Descent for Composite Empirical Risk Minimization Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2021-10-22 | Updated: 2022-10-21 Algorithm DesignPrivacy ProtectionMachine Learning Method 2021.10.22 2025.05.28 Literature Database
CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi | Published: 2021-10-21 Reverse EngineeringAdversarial TrainingMachine Learning Method 2021.10.21 2025.05.28 Literature Database
Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05 AlgorithmDistributed LearningMachine Learning Method 2021.09.05 2025.05.28 Literature Database
CrypTen: Secure Multi-Party Computation Meets Machine Learning Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15 Membership InferenceMachine Learning MethodComputational Efficiency 2021.09.02 2025.05.28 Literature Database
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02 AlgorithmAdversarial ExampleMachine Learning Method 2021.08.31 2025.05.28 Literature Database
Private Multi-Task Learning: Formulation and Applications to Federated Learning Authors: Shengyuan Hu, Zhiwei Steven Wu, Virginia Smith | Published: 2021-08-30 | Updated: 2023-10-17 Privacy AssessmentMachine Learning MethodFederated Learning 2021.08.30 2025.05.28 Literature Database