Model Design

Network Intrusion Detection System in a Light Bulb

Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann | Published: 2022-10-06
IoT Security Risks
Model Design
Decision Tree

A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05
DNN IP Protection Method
Model Design
Deep Learning Method

Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase

Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04
Framework
Model Design
Deep Learning Method

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang | Published: 2022-10-04
FPGA
Model Design
Performance Evaluation Metrics

NeuDep: Neural Binary Memory Dependence Analysis

Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04
Memory Management Method
Model Design
Dynamic Analysis Method

DeltaBound Attack: Efficient decision-based attack in low queries regime

Authors: Lorenzo Rossi | Published: 2022-10-01
DNN IP Protection Method
Model Extraction Attack
Model Design

ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks

Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01
Backdoor Attack
Model Design

No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy”

Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29
Data Protection Method
Privacy Assessment
Model Design

A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks

Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30
DNN IP Protection Method
Model Design
Deep Learning Method

Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation

Authors: Qiongxiu Li, Jaron Skovsted Gundersen, Katrine Tjell, Rafal Wisniewski, Mads Græsbøll Christensen | Published: 2022-09-16
Privacy Analysis
Model Design
Multi-Party Computation