A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05 DNN IP Protection MethodModel DesignDeep Learning Method 2022.10.05 2025.05.28 Literature Database
Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05 Adversarial Attack MethodsTime-Related FeaturesDeep Learning Method 2022.10.05 2025.05.28 Literature Database
Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04 FrameworkModel DesignDeep Learning Method 2022.10.04 2025.05.28 Literature Database
Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17 Privacy Protection MethodPrivacy AssessmentDeep Learning Method 2022.10.04 2025.05.28 Literature Database
A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30 DNN IP Protection MethodModel DesignDeep Learning Method 2022.09.28 2025.05.28 Literature Database
Anomaly detection optimization using big data and deep learning to reduce false-positive Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28 Security labelData Protection MethodDeep Learning Method 2022.09.28 2025.05.28 Literature Database
Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy Authors: Kai Packhäuser, Sebastian Gündel, Florian Thamm, Felix Denzinger, Andreas Maier | Published: 2022-09-23 | Updated: 2023-07-24 Privacy Protection MethodPrivacy AssessmentDeep Learning Method 2022.09.23 2025.05.28 Literature Database
M^4I: Multi-modal Models Membership Inference Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15 Privacy AnalysisModel DesignDeep Learning Method 2022.09.15 2025.05.28 Literature Database
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 Model DesignAdversarial Attack DetectionDeep Learning Method 2022.09.14 2025.05.28 Literature Database
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 Model Extraction AttackModel DesignDeep Learning Method 2022.09.14 2025.05.28 Literature Database