Picture for Willy Susilo

Willy Susilo

Intellectual Property Protection for Deep Learning Model and Dataset Intelligence

Add code
Nov 07, 2024
Viaarxiv icon

Defense Against Multi-target Trojan Attacks

Add code
Jul 08, 2022
Figure 1 for Defense Against Multi-target Trojan Attacks
Figure 2 for Defense Against Multi-target Trojan Attacks
Figure 3 for Defense Against Multi-target Trojan Attacks
Figure 4 for Defense Against Multi-target Trojan Attacks
Viaarxiv icon

CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences

Add code
May 31, 2022
Figure 1 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 2 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 3 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Figure 4 for CASSOCK: Viable Backdoor Attacks against DNN in The Wall of Source-Specific Backdoor Defences
Viaarxiv icon

Towards Effective and Robust Neural Trojan Defenses via Input Filtering

Add code
Mar 08, 2022
Figure 1 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 2 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 3 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Figure 4 for Towards Effective and Robust Neural Trojan Defenses via Input Filtering
Viaarxiv icon

ABG: A Multi-Party Mixed Protocol Framework for Privacy-Preserving Cooperative Learning

Add code
Feb 10, 2022
Viaarxiv icon

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Add code
Feb 23, 2019
Figure 1 for Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data
Figure 2 for Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data
Figure 3 for Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data
Figure 4 for Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data
Viaarxiv icon