Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 2021.07.29 2025.04.03 文献データベース
PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29 2021.07.29 2025.04.03 文献データベース
Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15 2021.07.29 2025.04.03 文献データベース
PDF-Malware: An Overview on Threats, Detection and Evasion Attacks Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27 2021.07.27 2025.04.03 文献データベース
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Fully Homomorphically Encrypted Deep Learning as a Service Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 2021.07.26 2025.04.03 文献データベース
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 2021.07.26 2025.04.03 文献データベース
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 2021.07.25 2025.04.03 文献データベース
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16 2021.07.24 2025.04.03 文献データベース