Watermarking

A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions

Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11
Watermarking
Security of Signal Transmission
Physical layer security

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Cybersecurity
Dataset Generation

Privacy preserving layer partitioning for Deep Neural Network models

Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Privacy Protection Method
Computational Efficiency

Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08
Watermarking
Malware Classification
Evaluation Method

BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack

Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01
Watermarking
Attack Method
Adversarial Example

Advances in Differential Privacy and Differentially Private Machine Learning

Authors: Saswat Das, Subhankar Mishra | Published: 2024-04-06
Watermarking
Data Privacy Assessment
Privacy Protection Method

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05
Watermarking
Model Performance Evaluation
Adversarial Example

Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning

Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04
Watermarking
Membership Inference
Label Inference Attack

Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption

Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07
Watermarking
Model Performance Evaluation
Computational Efficiency

LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation

Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04
Watermarking
Security Analysis
Anomaly Detection Method