nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29 CKKS OptimizationPerformance EvaluationEncryption Technology 2019.08.12 2025.05.28 Literature Database
A systematic review of fuzzing based on machine learning techniques Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04 Data Generation MethodPerformance EvaluationMachine Learning 2019.08.04 2025.05.28 Literature Database
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10 Security AssurancePrivacy ProtectionPerformance Evaluation 2019.07.24 2025.05.28 Literature Database
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28 Model EvaluationPerformance EvaluationAdversarial Perturbation Techniques 2019.05.28 2025.05.28 Literature Database
Robustification of deep net classifiers by key based diversified aggregation with pre-filtering Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14 Secure AggregationPerformance EvaluationAttack Type 2019.05.14 2025.05.28 Literature Database
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12 Performance EvaluationMachine Learning TechnologyMulti-Sensor Defense 2019.05.12 2025.05.28 Literature Database
ECG Identification under Exercise and Rest Situations via Various Learning Methods Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11 Signal Processing TechniquesPerformance EvaluationTime Series Analysis 2019.05.11 2025.05.28 Literature Database
Conditionals in Homomorphic Encryption and Machine Learning Applications Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09 Privacy AssurancePerformance EvaluationCryptography 2018.10.29 2025.05.28 Literature Database
Evading classifiers in discrete domains with provable optimality guarantees Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | Published: 2018-10-25 | Updated: 2019-07-01 Certified RobustnessPerformance EvaluationAdversarial Learning 2018.10.25 2025.05.28 Literature Database
IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection Authors: Zilong Lin, Yong Shi, Zhi Xue | Published: 2018-09-06 | Updated: 2022-05-08 Model DoSPerformance EvaluationAdversarial Learning 2018.09.06 2025.05.28 Literature Database