Watermarking Technology

Learning More Robust Features with Adversarial Training

Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20
Adversarial Learning
Adversarial Learning
Watermarking Technology

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
Adversarial Example Detection
Adversarial Attack Methods
Watermarking Technology

Secure $k$-ish Nearest Neighbors Classifier

Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30
Secure Arithmetic Computation
Machine Learning Method
Watermarking Technology

Gazelle: A Low Latency Framework for Secure Neural Network Inference

Authors: Chiraag Juvekar, Vinod Vaikuntanathan, Anantha Chandrakasan | Published: 2018-01-16
Secure Arithmetic Computation
Encryption Technology
Watermarking Technology

BinPro: A Tool for Binary Source Code Provenance

Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02
Machine Learning
Watermarking Technology
Similarity Measurement

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01
Security Information Management
Machine Learning
Watermarking Technology