Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15 Performance EvaluationRisk Assessment MethodDeep Learning Technology 2021.03.15 2025.05.28 Literature Database
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 CybersecurityModel ArchitectureDeep Learning Technology 2021.03.12 2025.05.28 Literature Database
MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05 WatermarkingMulti-Class ClassificationDeep Learning Technology 2021.03.05 2025.05.28 Literature Database
Efficient Encrypted Inference on Ensembles of Decision Trees Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05 Performance EvaluationReal-Time InferenceDeep Learning Technology 2021.03.05 2025.05.28 Literature Database
Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning Authors: Renjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue, Lijun Zhang | Published: 2021-01-25 | Updated: 2022-04-13 PAC RobustnessPerformance Evaluation MetricsDeep Learning Technology 2021.01.25 2025.05.28 Literature Database
Do Wider Neural Networks Really Help Adversarial Robustness? Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14 Robustness EvaluationAdversarial ExampleDeep Learning Technology 2020.10.03 2025.05.28 Literature Database
Second Order Optimization for Adversarial Robustness and Interpretability Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10 Performance EvaluationAdversarial Attack MethodsDeep Learning Technology 2020.09.10 2025.05.28 Literature Database
SoK: Certified Robustness for Deep Neural Networks Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12 Formal VerificationDeep Learning TechnologyVulnerability Assessment Method 2020.09.09 2025.05.28 Literature Database
Highly Accurate CNN Inference Using Approximate Activation Functions over Homomorphic Encryption Authors: Takumi Ishiyama, Takuya Suzuki, Hayato Yamana | Published: 2020-09-08 | Updated: 2020-12-02 Levelled Homomorphic EncryptionCryptographyDeep Learning Technology 2020.09.08 2025.05.28 Literature Database
Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05 Adversarial ExampleAdversarial attackDeep Learning Technology 2020.09.02 2025.05.28 Literature Database