Differentially Private AUC Computation in Vertical Federated Learning Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Junyuan Xie, Di Wu, Chong Wang | Published: 2022-05-24 Client-Side ComponentData CollectionWatermark Evaluation 2022.05.24 2025.05.28 Literature Database
Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09 Model Performance EvaluationDeep Learning MethodWatermark Evaluation 2021.03.09 2025.05.28 Literature Database
Privacy-preserving feature selection: A survey and proposing a new set of protocols Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17 Privacy-Preserving Data MiningEvaluation MethodWatermark Evaluation 2020.08.17 2025.05.28 Literature Database
ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16 Adversarial LearningWatermark EvaluationEffectiveness Analysis of Defense Methods 2020.01.02 2025.05.28 Literature Database
secml: A Python Library for Secure and Explainable Machine Learning Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Marco Melis, Ambra Demontis, Battista Biggio | Published: 2019-12-20 | Updated: 2022-05-13 PoisoningAdversarial LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database
Random CapsNet Forest Model for Imbalanced Malware Type Classification Task Authors: Aykut Çayır, Uğur Ünal, Hasan Dağ | Published: 2019-12-20 | Updated: 2020-08-23 Adversarial LearningDeep LearningWatermark Evaluation 2019.12.20 2025.05.28 Literature Database
A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07 CybersecurityClimate InformationWatermark Evaluation 2018.06.07 2025.05.28 Literature Database
MEBN-RM: A Mapping between Multi-Entity Bayesian Network and Relational Model Authors: Cheol Young Park, Kathryn Blackmond Laskey | Published: 2018-06-06 | Updated: 2018-06-08 Relational DatabaseWatermark EvaluationFunction Mapping 2018.06.06 2025.05.28 Literature Database
Killing four birds with one Gaussian process: the relation between different test-time attacks Authors: Kathrin Grosse, Michael T. Smith, Michael Backes | Published: 2018-06-06 | Updated: 2020-11-29 Prompt leakingMembership InferenceWatermark Evaluation 2018.06.06 2025.05.28 Literature Database
Set-based Obfuscation for Strong PUFs against Machine Learning Attacks Authors: Jiliang Zhang, Chaoqun Shen | Published: 2018-06-06 | Updated: 2019-11-13 CybersecurityUser Authentication SystemWatermark Evaluation 2018.06.06 2025.05.28 Literature Database