Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19 Device Identification MethodMachine LearningFeature Extraction Method 2020.10.16 2025.05.28 Literature Database
Securing Manufacturing Using Blockchain Authors: Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge | Published: 2020-10-15 Network Threat DetectionBlockchain TechnologyMachine Learning 2020.10.15 2025.05.28 Literature Database
Privacy-Preserving Object Detection & Localization Using Distributed Machine Learning: A Case Study of Infant Eyeblink Conditioning Authors: Stefan Zwaard, Henk-Jan Boele, Hani Alers, Christos Strydis, Casey Lew-Williams, Zaid Al-Ars | Published: 2020-10-14 Machine LearningFederated LearningFace Recognition 2020.10.14 2025.05.28 Literature Database
Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings Authors: Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, Marzyeh Ghassemi | Published: 2020-10-13 DP-SGDData Privacy AssessmentMachine Learning 2020.10.13 2025.05.28 Literature Database
Toward Few-step Adversarial Training from a Frequency Perspective Authors: Hans Shih-Han Wang, Cory Cornelius, Brandon Edwards, Jason Martin | Published: 2020-10-13 Generalization PerformanceOptimization ProblemMachine Learning 2020.10.13 2025.05.28 Literature Database
S3ML: A Secure Serving System for Machine Learning Inference Authors: Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao | Published: 2020-10-13 SGX Application DevelopmentInformation SecurityMachine Learning 2020.10.13 2025.05.28 Literature Database
CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07 Model ArchitectureImprovement of LearningMachine Learning 2020.10.07 2025.05.28 Literature Database
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02 Membership InferenceAdversarial attackMachine Learning 2020.10.07 2025.05.28 Literature Database
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08 Dataset evaluationBackdoor AttackMachine Learning 2020.10.06 2025.05.28 Literature Database
PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning Authors: Yuli Zheng, Zhenyu Wu, Ye Yuan, Tianlong Chen, Zhangyang Wang | Published: 2020-10-06 Data Protection MethodMachine LearningFinancial Intelligence 2020.10.06 2025.05.28 Literature Database