Picture for Zeki Bilgin

Zeki Bilgin

Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning

Add code
Nov 29, 2021
Figure 1 for Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning
Figure 2 for Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning
Figure 3 for Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning
Figure 4 for Anomaly Localization in Model Gradients Under Backdoor Attacks Against Federated Learning
Viaarxiv icon

Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Add code
May 07, 2021
Figure 1 for Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Figure 2 for Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Figure 3 for Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Figure 4 for Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction
Viaarxiv icon