Deep Learning

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning

Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25
Poisoning
Adversarial Learning
Deep Learning

Multiple Classification with Split Learning

Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11
Reconstruction Attack
Deep Learning
Deep Learning Method

NoPeek: Information leakage reduction to share activations in distributed deep learning

Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20
Information Leakage Analysis
Adversarial Example
Deep Learning

Towards adversarial robustness with 01 loss neural networks

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20
Adversarial Spectrum Attack Detection
Deep Learning
Computational Complexity

GraphReach: Position-Aware Graph Neural Network using Reachability Estimations

Authors: Sunil Nishad, Shubhangi Agarwal, Arnab Bhattacharya, Sayan Ranu | Published: 2020-08-19 | Updated: 2021-08-20
Graph Transformation
Deep Learning
Deep Learning Method

Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31
Poisoning
Attack Method
Deep Learning

Black-box Adversarial Sample Generation Based on Differential Evolution

Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30
Attack Method
Deep Learning
Research Methodology

DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30
Performance Evaluation
Deep Learning
Computational Efficiency

A General Framework For Detecting Anomalous Inputs to DNN Classifiers

Authors: Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee | Published: 2020-07-29 | Updated: 2021-06-17
Performance Evaluation
Attack Method
Deep Learning

Evaluation of Federated Learning in Phishing Email Detection

Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21
Privacy Assessment
Performance Evaluation
Deep Learning