Picture for Michail Maniatakos

Michail Maniatakos

New York University Abu Dhabi

LLMPot: Automated LLM-based Industrial Protocol and Physical Process Emulation for ICS Honeypots

Add code
May 09, 2024
Viaarxiv icon

HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis

Add code
Jun 07, 2023
Figure 1 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 2 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 3 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Figure 4 for HowkGPT: Investigating the Detection of ChatGPT-generated University Student Homework through Context-Aware Perplexity Analysis
Viaarxiv icon

Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning

Add code
Apr 20, 2023
Figure 1 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 2 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 3 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Figure 4 for Get Rid Of Your Trail: Remotely Erasing Backdoors in Federated Learning
Viaarxiv icon

Privacy-preserving machine learning for healthcare: open challenges and future perspectives

Add code
Mar 27, 2023
Viaarxiv icon

Optimal Smoothing Distribution Exploration for Backdoor Neutralization in Deep Learning-based Traffic Systems

Add code
Mar 24, 2023
Viaarxiv icon

Scalable privacy-preserving cancer type prediction with homomorphic encryption

Add code
Apr 12, 2022
Figure 1 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 2 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 3 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Figure 4 for Scalable privacy-preserving cancer type prediction with homomorphic encryption
Viaarxiv icon

PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks

Add code
Mar 26, 2022
Figure 1 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 2 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 3 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Figure 4 for PiDAn: A Coherence Optimization Approach for Backdoor Attack Detection and Mitigation in Deep Neural Networks
Viaarxiv icon

ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages

Add code
Feb 21, 2022
Figure 1 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 2 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 3 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Figure 4 for ICSML: Industrial Control Systems Machine Learning inference framework natively executing on IEC 61131-3 languages
Viaarxiv icon

TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis

Add code
Aug 14, 2021
Figure 1 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 2 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 3 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Figure 4 for TRAPDOOR: Repurposing backdoors to detect dataset bias in machine learning-based genomic analysis
Viaarxiv icon

Explainability Matters: Backdoor Attacks on Medical Imaging

Add code
Dec 30, 2020
Figure 1 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 2 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 3 for Explainability Matters: Backdoor Attacks on Medical Imaging
Figure 4 for Explainability Matters: Backdoor Attacks on Medical Imaging
Viaarxiv icon