Exploring Edge TPU for Network Intrusion Detection in IoT

Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30

Enabling Homomorphically Encrypted Inference for Large DNN Models

Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30

MISA: Online Defense of Trojaned Models using Misattributions

Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23

Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models

Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29

Privacy and Trust Redefined in Federated Machine Learning

Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan | Published: 2021-03-29 | Updated: 2021-03-30

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Authors: Iqbal H. Sarker | Published: 2021-03-28

Graph Unlearning

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16

Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks

Authors: Curtis G. Northcutt, Anish Athalye, Jonas Mueller | Published: 2021-03-26 | Updated: 2021-11-07

Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses

Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26