Picture for Birhanu Eshete

Birhanu Eshete

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Add code
Jun 15, 2022
Figure 1 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 2 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 3 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 4 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Viaarxiv icon

MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members

Add code
Mar 02, 2022
Figure 1 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 2 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 3 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 4 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Viaarxiv icon

Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem

Add code
Feb 18, 2022
Figure 1 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 2 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 3 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 4 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Viaarxiv icon

DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning

Add code
Dec 24, 2021
Figure 1 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 2 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 3 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 4 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Viaarxiv icon

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Add code
Sep 02, 2021
Figure 1 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 2 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 3 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 4 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Viaarxiv icon

Morphence: Moving Target Defense Against Adversarial Examples

Add code
Sep 02, 2021
Figure 1 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 2 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 3 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 4 for Morphence: Moving Target Defense Against Adversarial Examples
Viaarxiv icon

Explanation-Guided Diagnosis of Machine Learning Evasion Attacks

Add code
Jun 30, 2021
Figure 1 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 2 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 3 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 4 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Viaarxiv icon

PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting

Add code
Feb 19, 2021
Figure 1 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 2 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 3 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 4 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Viaarxiv icon

Best-Effort Adversarial Approximation of Black-Box Malware Classifiers

Add code
Jun 28, 2020
Figure 1 for Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
Figure 2 for Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
Figure 3 for Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
Figure 4 for Best-Effort Adversarial Approximation of Black-Box Malware Classifiers
Viaarxiv icon