Deep Learning Technology

MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection

Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05
Watermarking
Multi-Class Classification
Deep Learning Technology

Efficient Encrypted Inference on Ensembles of Decision Trees

Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05
Performance Evaluation
Real-Time Inference
Deep Learning Technology

Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning

Authors: Renjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue, Lijun Zhang | Published: 2021-01-25 | Updated: 2022-04-13
PAC Robustness
Performance Evaluation Metrics
Deep Learning Technology

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14
Robustness Evaluation
Adversarial Example
Deep Learning Technology

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology

SoK: Certified Robustness for Deep Neural Networks

Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12
Formal Verification
Deep Learning Technology
Vulnerability Assessment Method

Highly Accurate CNN Inference Using Approximate Activation Functions over Homomorphic Encryption

Authors: Takumi Ishiyama, Takuya Suzuki, Hayato Yamana | Published: 2020-09-08 | Updated: 2020-12-02
Levelled Homomorphic Encryption
Cryptography
Deep Learning Technology

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05
Adversarial Example
Adversarial attack
Deep Learning Technology

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01
FDI Attack Detection Methods
Cybersecurity
Deep Learning Technology

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30
Adversarial Example
Adversarial attack
Deep Learning Technology