Alert button
Picture for Pavlos Papadopoulos

Pavlos Papadopoulos

Alert button

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Add code
Bookmark button
Alert button
Apr 26, 2021
Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan

Figure 1 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 2 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 3 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Figure 4 for Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
Viaarxiv icon

Practical Defences Against Model Inversion Attacks for Split Neural Networks

Add code
Bookmark button
Alert button
Apr 21, 2021
Tom Titcombe, Adam J. Hall, Pavlos Papadopoulos, Daniele Romanini

Figure 1 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 2 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 3 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Figure 4 for Practical Defences Against Model Inversion Attacks for Split Neural Networks
Viaarxiv icon

PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN

Add code
Bookmark button
Alert button
Apr 14, 2021
Daniele Romanini, Adam James Hall, Pavlos Papadopoulos, Tom Titcombe, Abbas Ismail, Tudor Cebere, Robert Sandmann, Robin Roehm, Michael A. Hoeh

Figure 1 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 2 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 3 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Figure 4 for PyVertical: A Vertical Federated Learning Framework for Multi-headed SplitNN
Viaarxiv icon

Privacy and Trust Redefined in Federated Machine Learning

Add code
Bookmark button
Alert button
Mar 30, 2021
Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan

Figure 1 for Privacy and Trust Redefined in Federated Machine Learning
Figure 2 for Privacy and Trust Redefined in Federated Machine Learning
Figure 3 for Privacy and Trust Redefined in Federated Machine Learning
Figure 4 for Privacy and Trust Redefined in Federated Machine Learning
Viaarxiv icon

Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning

Add code
Bookmark button
Alert button
Nov 18, 2020
Nick Angelou, Ayoub Benaissa, Bogdan Cebere, William Clark, Adam James Hall, Michael A. Hoeh, Daniel Liu, Pavlos Papadopoulos, Robin Roehm, Robert Sandmann, Phillipp Schoppmann, Tom Titcombe

Figure 1 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 2 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 3 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Figure 4 for Asymmetric Private Set Intersection with Applications to Contact Tracing and Private Vertical Federated Machine Learning
Viaarxiv icon

A Distributed Trust Framework for Privacy-Preserving Machine Learning

Add code
Bookmark button
Alert button
Jun 03, 2020
Will Abramson, Adam James Hall, Pavlos Papadopoulos, Nikolaos Pitropakis, William J Buchanan

Figure 1 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 2 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 3 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Figure 4 for A Distributed Trust Framework for Privacy-Preserving Machine Learning
Viaarxiv icon

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Add code
Bookmark button
Alert button
May 13, 2020
Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

Figure 1 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Figure 2 for Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach
Viaarxiv icon