Machine Learning Method

Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data

Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06
Medical Monitoring System
Machine Learning Application
Machine Learning Method

Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem

Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29
Machine Learning Application
Machine Learning Method
Feature Engineering

A Machine Learning Approach for DDoS Detection on IoT Devices

Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28
DDoS Attack
Data Preprocessing
Machine Learning Method

Differentially Private Coordinate Descent for Composite Empirical Risk Minimization

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2021-10-22 | Updated: 2022-10-21
Algorithm Design
Privacy Protection
Machine Learning Method

CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi | Published: 2021-10-21
Reverse Engineering
Adversarial Training
Machine Learning Method

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05
Algorithm
Distributed Learning
Machine Learning Method

CrypTen: Secure Multi-Party Computation Meets Machine Learning

Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15
Membership Inference
Machine Learning Method
Computational Efficiency

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02
Algorithm
Adversarial Example
Machine Learning Method

Private Multi-Task Learning: Formulation and Applications to Federated Learning

Authors: Shengyuan Hu, Zhiwei Steven Wu, Virginia Smith | Published: 2021-08-30 | Updated: 2023-10-17
Privacy Assessment
Machine Learning Method
Federated Learning

Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs

Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04
Model Extraction Attack
Machine Learning Method
Defense Mechanism