Can You Hear It? Backdoor Attacks via Ultrasonic Triggers Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06 2021.07.30 2025.04.03 文献データベース
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 2021.07.29 2025.04.03 文献データベース
PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29 2021.07.29 2025.04.03 文献データベース
Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15 2021.07.29 2025.04.03 文献データベース
PDF-Malware: An Overview on Threats, Detection and Evasion Attacks Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27 2021.07.27 2025.04.03 文献データベース
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Fully Homomorphically Encrypted Deep Learning as a Service Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 2021.07.26 2025.04.03 文献データベース
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 2021.07.25 2025.04.03 文献データベース