Picture for Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Add code
Feb 19, 2024
Viaarxiv icon

Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries

Add code
Aug 18, 2022
Figure 1 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 2 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 3 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Figure 4 for Resisting Adversarial Attacks in Deep Neural Networks using Diverse Decision Boundaries
Viaarxiv icon

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Add code
Aug 03, 2022
Figure 1 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 2 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 3 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Figure 4 for On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel
Viaarxiv icon

PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function

Add code
Dec 09, 2021
Figure 1 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 2 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 3 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Figure 4 for PARL: Enhancing Diversity of Ensemble Networks to Resist Adversarial Attacks via Pairwise Adversarially Robust Loss Function
Viaarxiv icon

Deep-Lock: Secure Authorization for Deep Neural Networks

Add code
Aug 13, 2020
Figure 1 for Deep-Lock: Secure Authorization for Deep Neural Networks
Figure 2 for Deep-Lock: Secure Authorization for Deep Neural Networks
Viaarxiv icon

Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications

Add code
Feb 05, 2019
Figure 1 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 2 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 3 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Figure 4 for Enhancing Fault Tolerance of Neural Networks for Security-Critical Applications
Viaarxiv icon

How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?

Add code
Nov 13, 2018
Figure 1 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 2 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 3 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Figure 4 for How Secure are Deep Learning Algorithms from Side-Channel based Reverse Engineering?
Viaarxiv icon

Adversarial Attacks and Defences: A Survey

Add code
Sep 28, 2018
Figure 1 for Adversarial Attacks and Defences: A Survey
Figure 2 for Adversarial Attacks and Defences: A Survey
Figure 3 for Adversarial Attacks and Defences: A Survey
Figure 4 for Adversarial Attacks and Defences: A Survey
Viaarxiv icon