Performance Evaluation

POSSE: Patterns of Systems During Software Encryption

Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24
Software Security
Performance Evaluation
Machine Learning Application

Interpretability in Safety-Critical FinancialTrading Systems

Authors: Gabriel Deza, Adelin Travers, Colin Rowat, Nicolas Papernot | Published: 2021-09-24
Performance Evaluation
Machine Learning Application
Feature Importance Analysis

The More, the Better? A Study on Collaborative Machine Learning for DGA Detection

Authors: Arthur Drichel, Benedikt Holmes, Justus von Brandt, Ulrike Meyer | Published: 2021-09-24
Data Generation
Performance Evaluation
Federated Learning

A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection

Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26
Algorithm
Energy Management
Performance Evaluation

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
Performance Evaluation
Machine Learning Application
Anomaly Detection Method

Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel

Authors: Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng | Published: 2021-09-15
GPU Vulnerability
Membership Inference
Performance Evaluation

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06
Data Generation
Performance Evaluation
Adversarial attack

Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network

Authors: Joon-Woo Lee, HyungChul Kang, Yongwoo Lee, Woosuk Choi, Jieun Eom, Maxim Deryabin, Eunsang Lee, Junghyun Lee, Donghoon Yoo, Young-Sik Kim, Jong-Seon No | Published: 2021-06-14
Differential Privacy
Performance Evaluation
Encryption Technology

Adversarial Example Detection for DNN Models: A Review and Experimental Comparison

Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07
Performance Evaluation
Attack Scenario Analysis
Adversarial Example Detection

Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions

Authors: Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li | Published: 2021-04-22
Performance Evaluation
Adversarial Example Detection
Untargeted Toxicity Attack