Search

Your search keyword '"Koushanfar, Farinaz"' showing total 133 results

Search Constraints

Start Over You searched for: Author "Koushanfar, Farinaz" Remove constraint Author: "Koushanfar, Farinaz" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
133 results on '"Koushanfar, Farinaz"'

Search Results

1. EveGuard: Defeating Vibration-based Side-Channel Eavesdropping with Audio Adversarial Perturbations

2. AMAZE: Accelerated MiMC Hardware Architecture for Zero-Knowledge Applications on the Edge

3. Props for Machine-Learning Security

4. Watermarking Large Language Models and the Generated Content: Opportunities and Challenges

5. Automated Physical Design Watermarking Leveraging Graph Neural Networks

6. ICMarks: A Robust Watermarking Framework for Integrated Circuit Physical Design IP Protection

7. Token-Specific Watermarking with Enhanced Detectability and Semantic Coherence for Large Language Models

8. EmMark: Robust Watermarks for IP Protection of Embedded Quantized Large Language Models

11. SPAM: Secure & Private Aircraft Management

12. LiveTune: Dynamic Parameter Tuning for Feedback-Driven Optimization

13. LayerCollapse: Adaptive compression of neural networks

14. Distributed Constrained Combinatorial Optimization leveraging Hypergraph Neural Networks

15. Magmaw: Modality-Agnostic Adversarial Attacks on Machine Learning-Based Wireless Communication Systems

16. REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models

17. SelfVC: Voice Conversion With Iterative Refinement using Self Transformations

18. ZKROWNN: Zero Knowledge Right of Ownership for Neural Networks

19. SureFED: Robust Federated Learning via Uncertainty-Aware Inward and Outward Inspection

20. Secure and Trustworthy Computing 2.0 Vision Statement

21. G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts

23. Tailor: Altering Skip Connections for Resource-Efficient Inference

24. NetFlick: Adversarial Flickering Attacks on Deep Learning Based Video Compression

25. FastStamp: Accelerating Neural Steganography and Digital Watermarking of Images on FPGAs

26. Text Revealer: Private Text Reconstruction via Model Inversion Attacks against Transformers

27. PerD: Perturbation Sensitivity-based Neural Trojan Detection Framework on NLP Applications

28. Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

29. zPROBE: Zero Peek Robustness Checks for Federated Learning

30. ReFace: Real-time Adversarial Attacks on Face Recognition Systems

31. Adversarial Scratches: Deployable Attacks to CNN Classifiers

32. AdaTest:Reinforcement Learning and Adaptive Sampling for On-chip Hardware Trojan Detection

33. An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

34. FaceSigns: Semi-Fragile Neural Watermarks for Media Authentication and Countering Deepfakes

35. RoVISQ: Reduction of Video Service Quality via Adversarial Attacks on Deep Learning-based Video Compression

36. LiteTransformerSearch: Training-free Neural Architecture Search for Efficient Language Models

37. Backdoor Defense in Federated Learning Using Differential Testing and Outlier Detection

38. Machine Learning-Assisted E-jet Printing of Organic Flexible Biosensors

39. HASHTAG: Hash Signatures for Online Detection of Fault-Injection Attacks on Deep Neural Networks

42. FaceSigns: Semi-fragile Watermarks for Media Authentication.

Catalog

Books, media, physical & digital resources