Deep Learning

Decentralized Differentially Private Segmentation with PATE

Authors: Dominik Fay, Jens Sjölund, Tobias J. Oechtering | Published: 2020-04-10
Information-Theoretic Evaluation
Deep Learning
Image Feature Extraction

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14
Robustness Evaluation
Optimization Methods
Deep Learning

Towards a secure behavior modeling for IoT networks using Blockchain

Authors: Jawad Ali, Ahmad Shahrafidz Khalid, Eiad Yafi, Shahrulniza Musa, Waqas Ahmed | Published: 2020-01-06
IoT Security
Trusted Capable Model Environments
Deep Learning

Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure

Authors: Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd | Published: 2019-12-31
Optimization Methods
Deep Learning
Automated Intrusion Detection System

Random CapsNet Forest Model for Imbalanced Malware Type Classification Task

Authors: Aykut Çayır, Uğur Ünal, Hasan Dağ | Published: 2019-12-20 | Updated: 2020-08-23
Adversarial Learning
Deep Learning
Watermark Evaluation

Towards Verifying Robustness of Neural Networks Against Semantic Perturbations

Authors: Jeet Mohapatra, Tsui-Wei, Weng, Pin-Yu Chen, Sijia Liu, Luca Daniel | Published: 2019-12-19 | Updated: 2020-06-15
Robustness Evaluation
Adversarial Learning
Deep Learning

Deep Learning Based Android Malware Detection Framework

Authors: Soumya Sourav, Devashish Khulbe, Naman Kapoor | Published: 2019-12-10
Security label
Malicious Website Detection
Deep Learning

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique | Published: 2019-12-03 | Updated: 2020-05-14
Performance Evaluation
Machine Learning
Deep Learning

Fastened CROWN: Tightened Neural Network Robustness Certificates

Authors: Zhaoyang Lyu, Ching-Yun Ko, Zhifeng Kong, Ngai Wong, Dahua Lin, Luca Daniel | Published: 2019-12-02
Performance Evaluation
Deep Learning
Continuous Linear Function

A Method for Computing Class-wise Universal Adversarial Perturbations

Authors: Tejus Gupta, Abhishek Sinha, Nupur Kumari, Mayank Singh, Balaji Krishnamurthy | Published: 2019-12-01
Adversarial Example
Vulnerability of Adversarial Examples
Deep Learning