Defensive Approximation: Securing CNNs using Approximate Computing Authors: Amira Guesmi, Ihsen Alouani, Khaled Khasawneh, Mouna Baklouti, Tarek Frikha, Mohamed Abid, Nael Abu-Ghazaleh | Published: 2020-06-13 | Updated: 2021-07-29 Adversarial ExampleAdversarial Attack DetectionApproximate Calculation 2020.06.13 2025.05.28 Literature Database
Resilient Non-Submodular Maximization over Matroid Constraints Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-04-02 | Updated: 2018-12-06 Convergence AnalysisOptimization ProblemApproximate Calculation 2018.04.02 2025.05.28 Literature Database
Hardening Quantum Machine Learning Against Adversaries Authors: Nathan Wiebe, Ram Shankar Siva Kumar | Published: 2017-11-17 Detection of Model Extraction AttacksApproximate CalculationQuantum Machine Learning 2017.11.17 2025.05.28 Literature Database
CryptoDL: Deep Neural Networks over Encrypted Data Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14 Differential PrivacyEncryption TechnologyApproximate Calculation 2017.11.14 2025.05.28 Literature Database