Picture for Pavlos Papadopoulos

Pavlos Papadopoulos

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Add code
Apr 26, 2021
Figure 1 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 2 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 3 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 4 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Viaarxiv icon

Practical Defences Against Model Inversion Attacks for Split Neural Networks

Add code
Apr 21, 2021
Figure 1 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 2 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 3 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 4 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Viaarxiv icon

PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

Add code
Apr 14, 2021
Figure 1 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 2 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 3 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 4 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Viaarxiv icon

Privacy and Trust Redefined in Federated Machine Learning

Add code
Mar 30, 2021
Figure 1 for Privacy and Trust Redefined in Federated Machine Learning
Figure 2 for Privacy and Trust Redefined in Federated Machine Learning
Figure 3 for Privacy and Trust Redefined in Federated Machine Learning
Figure 4 for Privacy and Trust Redefined in Federated Machine Learning
Viaarxiv icon

Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning

Add code
Nov 18, 2020
Figure 1 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 2 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 3 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 4 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Viaarxiv icon

A Distributed Trust Framework for Privacy-Preserving Machine Learning

Add code
Jun 03, 2020
Figure 1 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 2 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 3 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 4 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Viaarxiv icon

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Add code
May 13, 2020
Figure 1 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Figure 2 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Viaarxiv icon