A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique | Published: 2023-08-10 | Updated: 2023-10-12 WatermarkingModel Design and AccuracyPerformance Evaluation 2023.08.10 2025.05.28 Literature Database
Random-Set Neural Networks (RS-NN) Authors: Shireen Kudukkil Manchingal, Muhammad Mubashar, Kaizheng Wang, Keivan Shariatmadar, Fabio Cuzzolin | Published: 2023-07-11 | Updated: 2025-02-14 Quantification of UncertaintyPerformance EvaluationLoss Function 2023.07.11 2025.05.28 Literature Database
ConFL: Constraint-guided Fuzzing for Machine Learning Framework Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11 Algorithm DesignFuzzingPerformance Evaluation 2023.07.11 2025.05.28 Literature Database
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
When Vision Fails: Text Attacks Against ViT and OCR Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12 Performance EvaluationAttack Pattern ExtractionWatermark Robustness 2023.06.12 2025.05.28 Literature Database
Augmenting Greybox Fuzzing with Generative AI Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11 FuzzingPrompt InjectionPerformance Evaluation 2023.06.11 2025.05.28 Literature Database
Efficient Skip Connections Realization for Secure Inference on Encrypted Data Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11 Privacy TechniqueReal-Time InferencePerformance Evaluation 2023.06.11 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27 Client ClusteringClustering methodsPerformance Evaluation 2023.03.28 2025.05.28 Literature Database