A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11 WatermarkingSecurity of Signal TransmissionPhysical layer security 2024.04.11 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08 WatermarkingMalware ClassificationEvaluation Method 2024.04.08 2025.05.27 Literature Database
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database
Advances in Differential Privacy and Differentially Private Machine Learning Authors: Saswat Das, Subhankar Mishra | Published: 2024-04-06 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.04.06 2025.05.27 Literature Database
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05 WatermarkingModel Performance EvaluationAdversarial Example 2024.04.05 2025.05.27 Literature Database
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04 WatermarkingMembership InferenceLabel Inference Attack 2024.04.04 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04 WatermarkingSecurity AnalysisAnomaly Detection Method 2024.04.03 2025.05.27 Literature Database