Search Results

Applications of Deep Neural Networks with Keras

2 code implementations11 Sep 2020

Through a combination of advanced training techniques and neural network architectural components, it is now possible to create neural networks that can handle tabular data, images, text, and audio as both input and output.

Time Series Time Series Analysis

EVA: An Encrypted Vector Arithmetic Language and Compiler for Efficient Homomorphic Computation

4 code implementations27 Dec 2019

We believe that EVA would enable a wider adoption of FHE by making it easier to develop FHE applications and domain-specific FHE compilers.

NexMon: A Cookbook for Firmware Modifications on Smartphones to Enable Monitor Mode

3 code implementations24 Dec 2015

Full control over a Wi-Fi chip for research purposes is often limited by its firmware, which makes it hard to evolve communication protocols and test schemes in practical environments.

Other Computer Science

Adversarial Attacks on ML Defense Models Competition

1 code implementation15 Oct 2021

Due to the vulnerability of deep neural networks (DNNs) to adversarial examples, a large number of defense techniques have been proposed to alleviate this problem in recent years.

Adversarial Attack Adversarial Robustness +1

On Securing MAC Layer Broadcast Signals Against Covert Channel Exploitation in 5G, 6G & Beyond

1 code implementation27 Aug 2021

In this work, we propose a novel framework to identify and mitigate a recently disclosed covert channel scheme exploiting unprotected broadcast messages in cellular MAC layer protocols.

Cryptography and Security Information Theory Networking and Internet Architecture Information Theory

Cross-Language Binary-Source Code Matching with Intermediate Representations

1 code implementation19 Jan 2022

Binary-source code matching plays an important role in many security and software engineering related tasks such as malware detection, reverse engineering and vulnerability assessment.

Malware Detection

Symbolic Execution for Deep Neural Networks

1 code implementation27 Jul 2018

Deep Neural Networks (DNN) are increasingly used in a variety of applications, many of them with substantial safety and security concerns.

Software Engineering Cryptography and Security

Device management and network connectivity as missing elements in TinyML landscape

1 code implementation23 Apr 2023

Nevertheless, the challenge discussed in the paper is the issue of network connectivity for such solutions.

Management Missing Elements

Deep-CAPTCHA: a deep learning based CAPTCHA solver for vulnerability assessment

1 code implementation15 Jun 2020

In this paper, we present our customised deep neural network model, we review the research gaps, the existing challenges, and the solutions to cope with the issues.

CAPTCHA Detection

ExAIS: Executable AI Semantics

1 code implementation20 Feb 2022

In this new paradigm, AI frameworks such as TensorFlow and PyTorch play a key role, which is as essential as the compiler for traditional programs.

Logical Reasoning valid