Picture for Olakunle Ibitoye

Olakunle Ibitoye

DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning

Add code
Jan 08, 2021
Figure 1 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 2 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 3 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Figure 4 for DiPSeN: Differentially Private Self-normalizing Neural Networks For Adversarial Robustness in Federated Learning
Viaarxiv icon

A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment

Add code
Nov 13, 2020
Figure 1 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 2 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 3 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Figure 4 for A GAN-based Approach for Mitigating Inference Attacks in Smart Home Environment
Viaarxiv icon

The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey

Add code
Nov 06, 2019
Figure 1 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 2 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 3 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Figure 4 for The Threat of Adversarial Attacks on Machine Learning in Network Security -- A Survey
Viaarxiv icon

Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks

Add code
May 13, 2019
Figure 1 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 2 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 3 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Figure 4 for Analyzing Adversarial Attacks Against Deep Learning for Intrusion Detection in IoT Networks
Viaarxiv icon