Plinius: Secure and Persistent Machine Learning Model Training Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana | Published: 2021-04-07 | Updated: 2021-04-08 Privacy ProtectionMemory Management MethodModel Design 2021.04.07 2025.05.28 Literature Database
Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19 Data GenerationModel DesignModel Communication 2019.12.19 2025.05.28 Literature Database
Adversarial Model Extraction on Graph Neural Networks Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16 Graph Neural NetworkModel DesignFundamentals of Machine Learning 2019.12.16 2025.05.28 Literature Database
Privacy preserving Neural Network Inference on Encrypted Data with GPUs Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26 Model DesignMachine Learning ApplicationImage Feature Extraction 2019.11.26 2025.05.28 Literature Database
Adversarial Attack with Pattern Replacement Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.25 2025.05.28 Literature Database
Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.23 2025.05.28 Literature Database
Fine-grained Synthesis of Unrestricted Adversarial Examples Authors: Omid Poursaeed, Tianxing Jiang, Yordanos Goshu, Harry Yang, Serge Belongie, Ser-Nam Lim | Published: 2019-11-20 | Updated: 2020-10-22 Model Performance EvaluationModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Adversarial Robustness of Flow-Based Generative Models Authors: Phillip Pope, Yogesh Balaji, Soheil Feizi | Published: 2019-11-20 Trade-off AnalysisModel DesignAdversarial Attack Methods 2019.11.20 2025.05.28 Literature Database
Robust Design of Deep Neural Networks against Adversarial Attacks based on Lyapunov Theory Authors: Arash Rahnama, Andre T. Nguyen, Edward Raff | Published: 2019-11-12 Model DesignNumerical Stability IssuesAdversarial Example 2019.11.12 2025.05.28 Literature Database
Mimic Learning to Generate a Shareable Network Intrusion Detection Model Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18 PoisoningModel DesignMachine Learning 2019.05.02 2025.05.28 Literature Database