Alert button
Picture for Birhanu Eshete

Birhanu Eshete

Alert button

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Add code
Bookmark button
Alert button
Jun 15, 2022
Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete

Figure 1 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 2 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 3 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Figure 4 for Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection
Viaarxiv icon

MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members

Add code
Bookmark button
Alert button
Mar 02, 2022
Ismat Jarin, Birhanu Eshete

Figure 1 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 2 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 3 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Figure 4 for MIAShield: Defending Membership Inference Attacks via Preemptive Exclusion of Members
Viaarxiv icon

Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem

Add code
Bookmark button
Alert button
Feb 18, 2022
Abderrahmen Amich, Birhanu Eshete

Figure 1 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 2 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 3 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Figure 4 for Rethinking Machine Learning Robustness via its Link with the Out-of-Distribution Problem
Viaarxiv icon

DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning

Add code
Bookmark button
Alert button
Dec 24, 2021
Ismat Jarin, Birhanu Eshete

Figure 1 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 2 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 3 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Figure 4 for DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning
Viaarxiv icon

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Add code
Bookmark button
Alert button
Sep 02, 2021
Abderrahmen Amich, Birhanu Eshete

Figure 1 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 2 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 3 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Figure 4 for EG-Booster: Explanation-Guided Booster of ML Evasion Attacks
Viaarxiv icon

Morphence: Moving Target Defense Against Adversarial Examples

Add code
Bookmark button
Alert button
Sep 02, 2021
Abderrahmen Amich, Birhanu Eshete

Figure 1 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 2 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 3 for Morphence: Moving Target Defense Against Adversarial Examples
Figure 4 for Morphence: Moving Target Defense Against Adversarial Examples
Viaarxiv icon

Explanation-Guided Diagnosis of Machine Learning Evasion Attacks

Add code
Bookmark button
Alert button
Jun 30, 2021
Abderrahmen Amich, Birhanu Eshete

Figure 1 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 2 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 3 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Figure 4 for Explanation-Guided Diagnosis of Machine Learning Evasion Attacks
Viaarxiv icon

PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting

Add code
Bookmark button
Alert button
Feb 19, 2021
Ismat Jarin, Birhanu Eshete

Figure 1 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 2 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 3 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Figure 4 for PRICURE: Privacy-Preserving Collaborative Inference in a Multi-Party Setting
Viaarxiv icon