Deep Learning Technology

Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions

Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24
IoT Security Risks
Privacy Protection
Deep Learning Technology

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25
Algorithm Design
Deep Learning Technology
Self-Supervised Learning

Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior

Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13
Poisoning
Optimization Methods
Deep Learning Technology

Understanding the Security of Deepfake Detection

Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06
Poisoning
Deep Learning Technology
Face Recognition System

Towards Scheduling Federated Deep Learning using Meta-Gradients for Inter-Hospital Learning

Authors: Rasheed el-Bouri, Tingting Zhu, David A. Clifton | Published: 2021-07-04
Scheduling Method
Deep Learning Technology
Federated Learning

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01
ML-Based IDS
Performance Evaluation
Deep Learning Technology

Undistillable: Making A Nasty Teacher That CANNOT teach students

Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16
Adversarial Learning
Deep Learning Technology
Self-Supervised Learning

LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack

Authors: Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Mubarak Shah, Ajmal Mian | Published: 2021-03-19 | Updated: 2021-03-22
Adversarial Attack Methods
Optimization Problem
Deep Learning Technology

Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory

Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15
Performance Evaluation
Risk Assessment Method
Deep Learning Technology

Explaining Network Intrusion Detection System Using Explainable AI Framework

Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12
Cybersecurity
Model Architecture
Deep Learning Technology