Search

Your search keyword '"Ali, Shahin"' showing total 295 results

Search Constraints

Start Over You searched for: Author "Ali, Shahin" Remove constraint Author: "Ali, Shahin"
295 results on '"Ali, Shahin"'

Search Results

1. OATH: Efficient and Flexible Zero-Knowledge Proofs of End-to-End ML Fairness

2. Nebula: Efficient, Private and Accurate Histogram Estimation

3. Context-Aware Membership Inference Attacks against Pre-trained Large Language Models

4. Identifying and Mitigating Privacy Risks Stemming from Language Models: A Survey

6. Clonal reproduction of Moniliophthora roreri and the emergence of unique lineages with distinct genomes during range expansion.

7. Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

8. Private Multi-Winner Voting for Machine Learning

9. On the reversibility of adversarial attacks

10. GAP: Differentially Private Graph Neural Networks with Aggregation Perturbation

11. Differentially Private Speaker Anonymization

12. Tubes Among Us: Analog Attack on Automatic Speaker Identification

13. When the Curious Abandon Honesty: Federated Learning Is Not Private

15. Modeling of diffuse reflectance for a two layered medium: A Monte-Carlo study

22. FoolHD: Fooling speaker identification by Highly imperceptible adversarial Disturbances

23. Semantically Adversarial Learnable Filters

24. Exploiting vulnerabilities of deep neural networks for privacy protection

25. DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

26. PrivEdge: From Local to Distributed Private Training and Prediction

27. Designing content-based adversarial perturbations and distributed one-class learning for images

28. ColorFool: Semantic Adversarial Colorization

29. EdgeFool: An Adversarial Image Enhancement Filter

30. Towards Characterizing and Limiting Information Exposure in DNN Layers

31. QUOTIENT: Two-Party Secure Neural Network Training and Prediction

32. Independent Whole-Genome Duplications Define the Architecture of the Genomes of the Devastating West African Cacao Black Pod Pathogen Phytophthora megakarya and Its Close Relative Phytophthora palmivora.

35. Distributed One-class Learning

36. Deep Private-Feature Extraction

37. Privacy-Preserving Deep Inference for Rich User Data on The Cloud

38. A Hybrid Deep Learning Architecture for Privacy-Preserving Mobile Analytics

49. Knowledge, Prevention, and Practice of Heat Strokes Among the Public in United Arab Emirates (UAE)

50. Pathogenicity of Lasiodiplodia theobromae isolated from cocoa dieback disease in South Sulawesi, Indonesia.

Catalog

Books, media, physical & digital resources