Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation

Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27

LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning

Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26

Fully Homomorphically Encrypted Deep Learning as a Service

Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26

Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning

Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26

Wavelet Selection and Employment for Side-Channel Disassembly

Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25