Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 2021.03.30 2025.04.03 文献データベース
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 2021.03.30 2025.04.03 文献データベース
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 2021.03.30 2025.04.03 文献データベース
MISA: Online Defense of Trojaned Models using Misattributions Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23 2021.03.29 2025.04.03 文献データベース
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29 2021.03.29 2025.04.03 文献データベース
Privacy and Trust Redefined in Federated Machine Learning Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan | Published: 2021-03-29 | Updated: 2021-03-30 2021.03.29 2025.04.03 文献データベース
CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks Authors: Iqbal H. Sarker | Published: 2021-03-28 2021.03.28 2025.04.03 文献データベース
Graph Unlearning Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16 2021.03.27 2025.04.03 文献データベース
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks Authors: Curtis G. Northcutt, Anish Athalye, Jonas Mueller | Published: 2021-03-26 | Updated: 2021-11-07 2021.03.26 2025.04.03 文献データベース
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 2021.03.26 2025.04.03 文献データベース