Search

Your search keyword '"Alouani, Ihsen"' showing total 178 results

Search Constraints

Start Over You searched for: Author "Alouani, Ihsen" Remove constraint Author: "Alouani, Ihsen"
178 results on '"Alouani, Ihsen"'

Search Results

1. Model for Peanuts: Hijacking ML Models without Training Access is Possible

2. Watermarking Neuromorphic Brains: Intellectual Property Protection in Spiking Neural Networks

3. SSAP: A Shape-Sensitive Adversarial Patch for Comprehensive Disruption of Monocular Depth Estimation in Autonomous Navigation Applications

4. BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks

5. Evasive Hardware Trojan through Adversarial Power Trace

6. May the Noise be with you: Adversarial Training without Adversarial Examples

8. Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

9. Attention Deficit is Ordered! Fooling Deformable Vision Transformers with Collaborative Adversarial Patches

10. Co(ve)rtex: ML Models as storage channels and their (mis-)applications

11. DAP: A Dynamic Adversarial Patch for Evading Person Detectors

12. Jedi: Entropy-based Localization and Removal of Adversarial Patches

13. Exploring Machine Learning Privacy/Utility trade-off from a hyperparameters Lens

14. AdvART: Adversarial Art for Camouflaged Object Detection Attacks

15. APARATE: Adaptive Adversarial Patch for CNN-based Monocular Depth Estimation for Autonomous Navigation

17. Defending with Errors: Approximate Computing for Robustness of Deep Neural Networks

18. Adversarial Attack on Radar-based Environment Perception Systems

20. Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

22. ROOM: Adversarial Machine Learning Attacks Under Real-Time Constraints

23. Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

24. PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

25. Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

26. An Investigation on Inherent Robustness of Posit Data Representation

27. Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters

28. Defensive Approximation: Securing CNNs using Approximate Computing

29. NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

33. Cross-layer CNN Approximations for Hardware Implementation

37. MDAD: A Multimodal and Multiview in-Vehicle Driver Action Dataset

48. SecureVolt: enhancing deep neural networks security via undervolting

50. ARABICA: A Reconfigurable Arithmetic Block for ISA Customization

Catalog

Books, media, physical & digital resources