Alert button
Picture for Buse Gul Atli

Buse Gul Atli

Alert button

WAFFLE: Watermarking in Federated Learning

Add code
Bookmark button
Alert button
Aug 17, 2020
Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan

Figure 1 for WAFFLE: Watermarking in Federated Learning
Figure 2 for WAFFLE: Watermarking in Federated Learning
Figure 3 for WAFFLE: Watermarking in Federated Learning
Figure 4 for WAFFLE: Watermarking in Federated Learning
Viaarxiv icon

Extraction of Complex DNN Models: Real Threat or Boogeyman?

Add code
Bookmark button
Alert button
Oct 11, 2019
Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan

Figure 1 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 2 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 3 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Figure 4 for Extraction of Complex DNN Models: Real Threat or Boogeyman?
Viaarxiv icon

DAWN: Dynamic Adversarial Watermarking of Neural Networks

Add code
Bookmark button
Alert button
Jun 12, 2019
Sebastian Szyller, Buse Gul Atli, Samuel Marchal, N. Asokan

Figure 1 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 2 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 3 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Figure 4 for DAWN: Dynamic Adversarial Watermarking of Neural Networks
Viaarxiv icon

Making targeted black-box evasion attacks effective and efficient

Add code
Bookmark button
Alert button
Jun 08, 2019
Mika Juuti, Buse Gul Atli, N. Asokan

Figure 1 for Making targeted black-box evasion attacks effective and efficient
Figure 2 for Making targeted black-box evasion attacks effective and efficient
Figure 3 for Making targeted black-box evasion attacks effective and efficient
Figure 4 for Making targeted black-box evasion attacks effective and efficient
Viaarxiv icon

Online Feature Ranking for Intrusion Detection Systems

Add code
Bookmark button
Alert button
Jun 15, 2018
Buse Gul Atli, Alexander Jung

Figure 1 for Online Feature Ranking for Intrusion Detection Systems
Figure 2 for Online Feature Ranking for Intrusion Detection Systems
Figure 3 for Online Feature Ranking for Intrusion Detection Systems
Figure 4 for Online Feature Ranking for Intrusion Detection Systems
Viaarxiv icon

Human-guided data exploration using randomisation

Add code
Bookmark button
Alert button
May 20, 2018
Kai Puolamäki, Emilia Oikarinen, Buse Gul Atli, Andreas Henelius

Figure 1 for Human-guided data exploration using randomisation
Figure 2 for Human-guided data exploration using randomisation
Figure 3 for Human-guided data exploration using randomisation
Figure 4 for Human-guided data exploration using randomisation
Viaarxiv icon