Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications Authors: Aryan Verma | Published: 2021-09-06 2021.09.06 2025.04.03 文献データベース
Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05 2021.09.05 2025.04.03 文献データベース
Predicting Process Name from Network Data Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03 2021.09.03 2025.04.03 文献データベース
CrypTen: Secure Multi-Party Computation Meets Machine Learning Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15 2021.09.02 2025.04.03 文献データベース
Excess Capacity and Backdoor Poisoning Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03 2021.09.02 2025.04.03 文献データベース
Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange Authors: Pengcheng Xia, Haoyu wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Published: 2021-09-01 | Updated: 2021-11-11 2021.09.01 2025.04.03 文献データベース
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 2021.09.01 2025.04.03 文献データベース
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02 2021.08.31 2025.04.03 文献データベース
Private Multi-Task Learning: Formulation and Applications to Federated Learning Authors: Shengyuan Hu, Zhiwei Steven Wu, Virginia Smith | Published: 2021-08-30 | Updated: 2023-10-17 2021.08.30 2025.04.03 文献データベース
Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04 2021.08.29 2025.04.03 文献データベース