Deep Learning Method

M^4I: Multi-modal Models Membership Inference

Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15
Privacy Analysis
Model Design
Deep Learning Method

Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries

Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14
Model Design
Adversarial Attack Detection
Deep Learning Method

SEEK: model extraction attack against hybrid secure inference protocols

Authors: Si Chen, Junfeng Fan | Published: 2022-09-14
Model Extraction Attack
Model Design
Deep Learning Method

LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks

Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23
Intrusion Detection System
Deep Learning Method
Evaluation Method

On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective

Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02
Sample Complexity
Robustness
Deep Learning Method

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13
Training Protocol
Adversarial Attack Methods
Deep Learning Method

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12
Malware Detection
Adversarial Example
Deep Learning Method

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12
Performance Evaluation
Adversarial Attack Methods
Deep Learning Method

Bayesian Estimation of Differential Privacy

Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15
Privacy Assessment
Bayesian Security
Deep Learning Method

GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

Authors: Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song | Published: 2022-06-09 | Updated: 2022-06-29
Robustness
Impact of Generalization
Deep Learning Method