Alert button
Picture for Soteris Demetriou

Soteris Demetriou

Alert button

Data Augmentation for Dementia Detection in Spoken Language

Add code
Bookmark button
Alert button
Jun 26, 2022
Anna Hlédiková, Dominika Woszczyk, Alican Acman, Soteris Demetriou, Björn Schuller

Figure 1 for Data Augmentation for Dementia Detection in Spoken Language
Figure 2 for Data Augmentation for Dementia Detection in Spoken Language
Figure 3 for Data Augmentation for Dementia Detection in Spoken Language
Figure 4 for Data Augmentation for Dementia Detection in Spoken Language
Viaarxiv icon

Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception

Add code
Bookmark button
Alert button
Apr 29, 2022
Zhongyuan Hau, Soteris Demetriou, Emil C. Lupu

Figure 1 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 2 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 3 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Figure 4 for Using 3D Shadows to Detect Object Hiding Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception

Add code
Bookmark button
Alert button
Jun 15, 2021
Chengzeng You, Zhongyuan Hau, Soteris Demetriou

Figure 1 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 2 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 3 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Figure 4 for Temporal Consistency Checks to Detect LiDAR Spoofing Attacks on Autonomous Vehicle Perception
Viaarxiv icon

Quantifying Information Leakage from Gradients

Add code
Bookmark button
Alert button
May 28, 2021
Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

Figure 1 for Quantifying Information Leakage from Gradients
Figure 2 for Quantifying Information Leakage from Gradients
Figure 3 for Quantifying Information Leakage from Gradients
Figure 4 for Quantifying Information Leakage from Gradients
Viaarxiv icon

Object Removal Attacks on LiDAR-based 3D Object Detectors

Add code
Bookmark button
Alert button
Feb 07, 2021
Zhongyuan Hau, Kenneth T. Co, Soteris Demetriou, Emil C. Lupu

Figure 1 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 2 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Figure 3 for Object Removal Attacks on LiDAR-based 3D Object Detectors
Viaarxiv icon

Layer-wise Characterization of Latent Information Leakage in Federated Learning

Add code
Bookmark button
Alert button
Oct 17, 2020
Fan Mo, Anastasia Borovykh, Mohammad Malekzadeh, Hamed Haddadi, Soteris Demetriou

Figure 1 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 2 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 3 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Figure 4 for Layer-wise Characterization of Latent Information Leakage in Federated Learning
Viaarxiv icon

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

Add code
Bookmark button
Alert button
Apr 12, 2020
Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi

Figure 1 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 2 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 3 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Figure 4 for DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments
Viaarxiv icon