Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18 WatermarkingDataset evaluationTraining Data Extraction Method 2020.12.18 2025.05.28 Literature Database
InstaHide’s Sample Complexity When Mixing Two Private Images Authors: Baihe Huang, Zhao Song, Runzhou Tao, Junze Yin, Ruizhe Zhang, Danyang Zhuo | Published: 2020-11-24 | Updated: 2024-02-06 WatermarkingData Privacy AssessmentStructural Learning 2020.11.24 2025.05.28 Literature Database
Adversarially Robust Classification based on GLRT Authors: Bhagyashree Puranik, Upamanyu Madhow, Ramtin Pedarsani | Published: 2020-11-16 WatermarkingPerformance EvaluationAdversarial attack 2020.11.16 2025.05.28 Literature Database
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier | Published: 2020-11-15 | Updated: 2021-04-18 WatermarkingPerformance EvaluationAttack Type 2020.11.15 2025.05.28 Literature Database
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions Authors: Runhua Xu, James Joshi | Published: 2020-11-12 | Updated: 2020-12-07 WatermarkingPrivacy Protection MethodEfficiency Evaluation 2020.11.12 2025.05.28 Literature Database
ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks Authors: Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha | Published: 2020-11-11 | Updated: 2023-07-06 TEE ImplementationWatermarkingModel Performance Evaluation 2020.11.11 2025.05.28 Literature Database
Privacy Preservation in Federated Learning: An insightful survey from the GDPR Perspective Authors: Nguyen Truong, Kai Sun, Siyao Wang, Florian Guitton, Yike Guo | Published: 2020-11-10 | Updated: 2021-03-18 WatermarkingData Privacy AssessmentPoisoning 2020.11.10 2025.05.28 Literature Database
Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25 TEE ImplementationWatermarkingFactors of Performance Degradation 2020.10.25 2025.05.28 Literature Database
Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30 WatermarkingRobustness Improvement MethodAttack Evaluation 2020.09.30 2025.05.28 Literature Database
A Systematic Review on Model Watermarking for Neural Networks Authors: Franziska Boenisch | Published: 2020-09-25 | Updated: 2021-12-08 WatermarkingMembership InferenceModel Identification 2020.09.25 2025.05.28 Literature Database