Performance Evaluation

A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks

Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique | Published: 2023-08-10 | Updated: 2023-10-12
Watermarking
Model Design and Accuracy
Performance Evaluation

Random-Set Neural Networks (RS-NN)

Authors: Shireen Kudukkil Manchingal, Muhammad Mubashar, Kaizheng Wang, Keivan Shariatmadar, Fabio Cuzzolin | Published: 2023-07-11 | Updated: 2025-02-14
Quantification of Uncertainty
Performance Evaluation
Loss Function

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11
Algorithm Design
Fuzzing
Performance Evaluation

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
Dataset Generation
Performance Evaluation
Vulnerability Management

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
Performance Evaluation
Threat modeling
Federated Learning

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

Augmenting Greybox Fuzzing with Generative AI

Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11
Fuzzing
Prompt Injection
Performance Evaluation

Efficient Skip Connections Realization for Secure Inference on Encrypted Data

Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11
Privacy Technique
Real-Time Inference
Performance Evaluation

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
Security Analysis
Performance Evaluation
Machine Learning Technology

Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27
Client Clustering
Clustering methods
Performance Evaluation