Bandwidth Utilization Side-Channel on ML Inference Accelerators Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14 Resource Consumption AnalysisAdversarial Attack MethodsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
Not all noise is accounted equally: How differentially private learning benefits from large sampling rates Authors: Friedrich Dörmann, Osvald Frisk, Lars Nørvang Andersen, Christian Fischer Pedersen | Published: 2021-10-12 DP-SGDPrivacy ViolationMachine Learning Algorithm 2021.10.12 2025.05.28 Literature Database
Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection Authors: Benedikt Holmes, Arthur Drichel, Ulrike Meyer | Published: 2021-10-12 Data GenerationPrivacy ViolationMachine Learning Algorithm 2021.10.12 2025.05.28 Literature Database
Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25 AlgorithmHyperparameter OptimizationMachine Learning Algorithm 2021.08.01 2025.05.28 Literature Database
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30 Data GenerationPoisoningMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Unveiling the potential of Graph Neural Networks for robust Intrusion Detection Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30 ML-Based IDSRobustnessMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Who’s Afraid of Thomas Bayes? Authors: Erick Galinkin | Published: 2021-07-30 Privacy LeakageQuantification of UncertaintyMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 Privacy LeakageModel DesignMachine Learning Algorithm 2021.07.29 2025.05.28 Literature Database
PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29 AlgorithmMachine Learning AlgorithmFace Recognition System 2021.07.29 2025.05.28 Literature Database
Poisoning the Search Space in Neural Architecture Search Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28 Data-Driven Vulnerability AssessmentEfficiency EvaluationMachine Learning Algorithm 2021.06.28 2025.05.28 Literature Database