Picture for Carsten Rudolph

Carsten Rudolph

Security and Privacy of 6G Federated Learning-enabled Dynamic Spectrum Sharing

Add code
Jun 18, 2024
Viaarxiv icon

RAI4IoE: Responsible AI for Enabling the Internet of Energy

Add code
Sep 20, 2023
Viaarxiv icon

Email Summarization to Assist Users in Phishing Identification

Add code
Mar 24, 2022
Figure 1 for Email Summarization to Assist Users in Phishing Identification
Figure 2 for Email Summarization to Assist Users in Phishing Identification
Viaarxiv icon

Robust Training Using Natural Transformation

Add code
May 10, 2021
Figure 1 for Robust Training Using Natural Transformation
Figure 2 for Robust Training Using Natural Transformation
Figure 3 for Robust Training Using Natural Transformation
Figure 4 for Robust Training Using Natural Transformation
Viaarxiv icon

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning

Add code
May 03, 2021
Figure 1 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 2 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 3 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Figure 4 for OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning
Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Jun 17, 2020
Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Defending Adversarial Attacks via Semantic Feature Manipulation

Add code
Feb 03, 2020
Figure 1 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 2 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 3 for Defending Adversarial Attacks via Semantic Feature Manipulation
Figure 4 for Defending Adversarial Attacks via Semantic Feature Manipulation
Viaarxiv icon

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning

Add code
Jan 18, 2020
Figure 1 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 2 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 3 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Figure 4 for OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning
Viaarxiv icon

Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models

Add code
Jan 10, 2020
Figure 1 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 2 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 3 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Figure 4 for Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models
Viaarxiv icon

Generating Semantic Adversarial Examples via Feature Manipulation

Add code
Jan 06, 2020
Figure 1 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 2 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 3 for Generating Semantic Adversarial Examples via Feature Manipulation
Figure 4 for Generating Semantic Adversarial Examples via Feature Manipulation
Viaarxiv icon