Picture for Ruby B. Lee

Ruby B. Lee

CloudShield: Real-time Anomaly Detection in the Cloud

Add code
Aug 25, 2021
Figure 1 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 2 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 3 for CloudShield: Real-time Anomaly Detection in the Cloud
Figure 4 for CloudShield: Real-time Anomaly Detection in the Cloud
Viaarxiv icon

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Add code
Mar 17, 2021
Figure 1 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 2 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 3 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Figure 4 for Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support
Viaarxiv icon

VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting

Add code
Aug 20, 2018
Figure 1 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 2 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 3 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Figure 4 for VerIDeep: Verifying Integrity of Deep Neural Networks through Sensitive-Sample Fingerprinting
Viaarxiv icon

Privacy-preserving Machine Learning through Data Obfuscation

Add code
Jul 13, 2018
Figure 1 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 2 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 3 for Privacy-preserving Machine Learning through Data Obfuscation
Figure 4 for Privacy-preserving Machine Learning through Data Obfuscation
Viaarxiv icon