Performance Evaluation

AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference

Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15
Performance Evaluation
Privacy Assessment
Encryption Method

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28
Performance Evaluation
Privacy Assessment
Machine Learning

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23
Performance Evaluation
Phishing Detection
Poisoning

Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks

Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23
Data Preprocessing
Performance Evaluation
Classification Pattern Analysis

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
Performance Evaluation
Threat Model
Watermarking Technology

Reaching Data Confidentiality and Model Accountability on the CalTrain

Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07
Trigger Detection
Performance Evaluation
Federated Learning

Three Tools for Practical Differential Privacy

Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07
Hyperparameter Optimization
Performance Evaluation
Differential Privacy