Deep Learning Method

A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05
DNN IP Protection Method
Model Design
Deep Learning Method

Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models

Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05
Adversarial Attack Methods
Time-Related Features
Deep Learning Method

Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase

Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04
Framework
Model Design
Deep Learning Method

Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints

Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17
Privacy Protection Method
Privacy Assessment
Deep Learning Method

A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks

Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30
DNN IP Protection Method
Model Design
Deep Learning Method

Anomaly detection optimization using big data and deep learning to reduce false-positive

Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28
Security label
Data Protection Method
Deep Learning Method

Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy

Authors: Kai Packhäuser, Sebastian Gündel, Florian Thamm, Felix Denzinger, Andreas Maier | Published: 2022-09-23 | Updated: 2023-07-24
Privacy Protection Method
Privacy Assessment
Deep Learning Method

M^4I: Multi-modal Models Membership Inference

Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15
Privacy Analysis
Model Design
Deep Learning Method

Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries

Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14
Model Design
Adversarial Attack Detection
Deep Learning Method

SEEK: model extraction attack against hybrid secure inference protocols

Authors: Si Chen, Junfeng Fan | Published: 2022-09-14
Model Extraction Attack
Model Design
Deep Learning Method