Model Design

Plinius: Secure and Persistent Machine Learning Model Training

Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana | Published: 2021-04-07 | Updated: 2021-04-08
Privacy Protection
Memory Management Method
Model Design

Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker

Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19
Data Generation
Model Design
Model Communication

Adversarial Model Extraction on Graph Neural Networks

Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16
Graph Neural Network
Model Design
Fundamentals of Machine Learning

Privacy preserving Neural Network Inference on Encrypted Data with GPUs

Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26
Model Design
Machine Learning Application
Image Feature Extraction

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology

Fine-grained Synthesis of Unrestricted Adversarial Examples

Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22
Model Performance Evaluation
Model Design
Adversarial Attack Methods

Adversarial Robustness of Flow-Based Generative Models

Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20
Trade-off Analysis
Model Design
Adversarial Attack Methods

Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory

Authors: Arash Rahnama, Andre T. Nguyen, Edward Raff | Published: 2019-11-12
Model Design
Numerical Stability Issues
Adversarial Example

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18
Poisoning
Model Design
Machine Learning