Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACNS (19. : 2021 : Online) Applied cryptography and network security workshops
1. Verfasser: Yoshida, Kota (VerfasserIn)
Weitere Verfasser: Fujino, Takeshi (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2021
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
The Obfuscation Method of User Identification System 2021 Xu, Jing
Proof of Assets in the Diem Blockchain 2021 Chatzigiannis, Panagiotis
A Good Anvil Fears No Hammer: Automated Rowhammer Detection Using Unsupervised Deep Learning 2021 Chakraborty, Anirban
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security 2021 Zhang, Yanhua
Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography 2021 Chen, Niusen
Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass 2021 Diop, Aïda
Kryptonite: An Adversarial Attack Using Regional Focus 2021 Kulkarni, Yogesh
Shaping Blockchain Technology for Securing Supply Chains 2021 Lim, Yong Zhi
An Identity-Based Blind Signature Scheme with Message Recovery from Pairings 2021 Wen, Yihong
Towards Trained Model Confidentiality and Integrity Using Trusted Execution Environments 2021 Nakai, Tsunato
Towards Real-Time Deep Learning-Based Network Intrusion Detection on FPGA 2021 Jeune, Laurens Le
Cyber-Attack Case Studies on Dynamic Voltage Restorer in Smart Grid 2021 Roomi, Muhammad M.
Attacklets to Test Anomaly Detectors for Critical Infrastructure 2021 Liyakkathali, Salimah
On Reverse Engineering Neural Network Implementation on GPU 2021 Chmielewski, Łukasz
Demand Manipulation Attack Resilient Privacy Aware Smart Grid Using PUFs and Blockchain 2021 Ghosh, Soumyadyuti
Memory Deduplication as a Protective Factor in Virtualized Systems 2021 Albalawi, Abdullah
A (Bit)slice of Rainbow 2021 Caullery, Florian
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor 2021 Sun, Aozhuo
POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack 2021 Debesse, Laetitia
POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools 2021 Baksi, Anubhab
Alle Artikel auflisten