RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras | Published: 2018-12-31 RF Attack Detection MethodRician Fading ModelTrigger Detection 2018.12.31 2025.05.28 Literature Database
Reaching Data Confidentiality and Model Accountability on the CalTrain Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07 Trigger DetectionPerformance EvaluationFederated Learning 2018.12.07 2025.05.28 Literature Database
MOBIUS: Model-Oblivious Binarized Neural Networks Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29 Trigger DetectionPrivacy-Preserving Machine LearningDifferential Privacy 2018.11.29 2025.05.28 Literature Database
Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25 Trigger DetectionModel Performance EvaluationEncryption Technology 2018.11.25 2025.05.28 Literature Database
FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20 Trigger DetectionMembership InferenceCryptographic Protocol 2018.11.20 2025.05.28 Literature Database
Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13 Trigger DetectionMalicious Content GenerationAttack Evaluation 2018.11.09 2025.05.28 Literature Database
SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15 Trigger DetectionRobustness ImprovementAttack Evaluation 2018.11.04 2025.05.28 Literature Database
RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27 Trigger DetectionMathematical AnalysisAdversarial Learning 2018.10.28 2025.05.28 Literature Database
Towards Query Efficient Black-box Attacks: An Input-free Perspective Authors: Yali Du, Meng Fang, Jinfeng Yi, Jun Cheng, Dacheng Tao | Published: 2018-09-09 Query Generation MethodTrigger DetectionPoisoning 2018.09.09 2025.05.28 Literature Database
Adversarial Attack Type I: Cheat Classifiers by Significant Changes Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22 Trigger DetectionRobustness AnalysisAdversarial Transferability 2018.09.03 2025.05.28 Literature Database