Alert button
Picture for Ruby B. Lee

Ruby B. Lee

Alert button

CloudShield: Real-time Anomaly Detection in the Cloud

Add code
Bookmark button
Alert button
Aug 25, 2021
Zecheng He, Ruby B. Lee

Figure 1 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 2 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 3 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 4 for CloudShield: Real-time Anomaly Detection in the Cloud
Viaarxiv icon

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Add code
Bookmark button
Alert button
Mar 17, 2021
Guangyuan Hu, Zecheng He, Ruby B. Lee

Figure 1 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 2 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 3 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 4 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Viaarxiv icon

VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting

Add code
Bookmark button
Alert button
Aug 20, 2018
Zecheng He, Tianwei Zhang, Ruby B. Lee

Figure 1 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 2 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 3 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 4 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Viaarxiv icon

Privacy-preserving Machine Learning through Data Obfuscation

Add code
Bookmark button
Alert button
Jul 13, 2018
Tianwei Zhang, Zecheng He, Ruby B. Lee

Figure 1 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 2 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 3 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 4 for Privacy-preserving Machine Learning through Data Obfuscation
Viaarxiv icon