DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19 DDoS Attack DetectionIoT Device IdentificationWatermarking 2024.04.19 2025.05.27 Literature Database
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06 AlgorithmWatermarkingPrivacy Protection 2024.04.18 2025.05.27 Literature Database
Decomposing and Editing Predictions by Modeling Model Computation Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17 WatermarkingModel InterpretabilityModel editing techniques 2024.04.17 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database
Federated Learning on Riemannian Manifolds with Differential Privacy Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15 WatermarkingPrivacy Protection MethodConvergence Analysis 2024.04.15 2025.05.27 Literature Database
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14 WatermarkingTraining ProtocolPrivacy Protection Method 2024.04.14 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11 WatermarkingSecurity of Signal TransmissionPhysical layer security 2024.04.11 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database