Alert button
Picture for Surya Nepal

Surya Nepal

Alert button

DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN

Add code
Bookmark button
Alert button
Jan 12, 2021
Alsharif Abuadbba, Hyoungshick Kim, Surya Nepal

Figure 1 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 2 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 3 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Figure 4 for DeepiSign: Invisible Fragile Watermark to Protect the Integrityand Authenticity of CNN
Viaarxiv icon

HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios

Add code
Bookmark button
Alert button
Dec 14, 2020
Hassan Ali, Surya Nepal, Salil S. Kanhere, Sanjay Jha

Figure 1 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 2 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 3 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Figure 4 for HaS-Nets: A Heal and Select Mechanism to Defend DNNs Against Backdoor Attacks for Data Collection Scenarios
Viaarxiv icon

Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks

Add code
Bookmark button
Alert button
Oct 08, 2020
Bedeuro Kim, Alsharif Abuadbba, Yansong Gao, Yifeng Zheng, Muhammad Ejaz Ahmed, Hyoungshick Kim, Surya Nepal

Figure 1 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 2 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 3 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Figure 4 for Decamouflage: A Framework to Detect Image-Scaling Attacks on Convolutional Neural Networks
Viaarxiv icon

Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review

Add code
Bookmark button
Alert button
Aug 02, 2020
Yansong Gao, Bao Gia Doan, Zhi Zhang, Siqi Ma, Jiliang Zhang, Anmin Fu, Surya Nepal, Hyoungshick Kim

Figure 1 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 2 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 3 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Figure 4 for Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review
Viaarxiv icon

FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning

Add code
Bookmark button
Alert button
Jul 27, 2020
Chandra Thapa, Jun Wen Tang, Sharif Abuadbba, Yansong Gao, Yifeng Zheng, Seyit A. Camtepe, Surya Nepal, Mahathir Almashor

Figure 1 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 2 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 3 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Figure 4 for FedEmail: Performance Measurement of Privacy-friendly Phishing Detection Enabled by Federated Learning
Viaarxiv icon

Adversarial Defense by Latent Style Transformations

Add code
Bookmark button
Alert button
Jun 17, 2020
Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen

Figure 1 for Adversarial Defense by Latent Style Transformations
Figure 2 for Adversarial Defense by Latent Style Transformations
Figure 3 for Adversarial Defense by Latent Style Transformations
Figure 4 for Adversarial Defense by Latent Style Transformations
Viaarxiv icon

Deep Learning for Community Detection: Progress, Challenges and Opportunities

Add code
Bookmark button
Alert button
May 17, 2020
Fanzhen Liu, Shan Xue, Jia Wu, Chuan Zhou, Wenbin Hu, Cecile Paris, Surya Nepal, Jian Yang, Philip S. Yu

Figure 1 for Deep Learning for Community Detection: Progress, Challenges and Opportunities
Figure 2 for Deep Learning for Community Detection: Progress, Challenges and Opportunities
Viaarxiv icon

End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things

Add code
Bookmark button
Alert button
Mar 30, 2020
Yansong Gao, Minki Kim, Sharif Abuadbba, Yeonjae Kim, Chandra Thapa, Kyuyeon Kim, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal

Figure 1 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 2 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 3 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Figure 4 for End-to-End Evaluation of Federated Learning and Split Learning for Internet of Things
Viaarxiv icon