Media Summary: Exploring Connections Between Active Learning CopyCat: Controlled Instruction-Level Attacks on Enclaves Daniel Moghimi, Worcester Polytechnic Institute; Jo Van Bulck, KU ... Preech: A System for Privacy-Preserving Speech Transcription Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, and ...

Usenix Security 20 Exploring Connections Between Active Learning And Model Extraction - Detailed Analysis & Overview

Exploring Connections Between Active Learning CopyCat: Controlled Instruction-Level Attacks on Enclaves Daniel Moghimi, Worcester Polytechnic Institute; Jo Van Bulck, KU ... Preech: A System for Privacy-Preserving Speech Transcription Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, and ... Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Abdulrahman Diaa, Lucas Fenaux, ... PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems R. Joseph Connor, Tyler McDaniel, Jared M. Smith, and Max ... Graph neural network is good at handling graph data and have been applied by many big components once the

An Investigation of the Android Kernel Patch Ecosystem Zheng Zhang, UC Riverside; Hang Zhang and Zhiyun Qian, UC Riverside ... CalcuLatency: Leveraging Cross-Layer Network Latency Measurements Conspirator: SmartNIC-Aided Control Plane for Distributed ML Workloads Yunming Xiao, Northwestern University; Diman Zad ...

Photo Gallery

USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction
USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves
USENIX Security '21 - Entangled Watermarks as a Defense against Model Extraction
USENIX Security '21 - Blind Backdoors in Deep Learning Models
USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels
USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models
USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...
USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription
USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems
USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...
USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search
Sponsored
Sponsored
View Detailed Profile
USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction

USENIX Security '20 - Exploring Connections Between Active Learning and Model Extraction

Exploring Connections Between Active Learning

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks

High Accuracy and High Fidelity

Sponsored
USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves

USENIX Security '20 - CopyCat: Controlled Instruction-Level Attacks on Enclaves

CopyCat: Controlled Instruction-Level Attacks on Enclaves Daniel Moghimi, Worcester Polytechnic Institute; Jo Van Bulck, KU ...

USENIX Security '21 - Entangled Watermarks as a Defense against Model Extraction

USENIX Security '21 - Entangled Watermarks as a Defense against Model Extraction

USENIX Security

USENIX Security '21 - Blind Backdoors in Deep Learning Models

USENIX Security '21 - Blind Backdoors in Deep Learning Models

USENIX Security

Sponsored
USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

USENIX Security '24 - SoK: Neural Network Extraction Through Physical Side Channels

SoK: Neural Network

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

USENIX Security '24 - SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

SecurityNet: Assessing Machine

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

USENIX Security '24 - SoK: All You Need to Know About On-Device ML Model Extraction - The Gap...

SoK: All You Need

USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription

USENIX Security '20 - Preech: A System for Privacy-Preserving Speech Transcription

Preech: A System for Privacy-Preserving Speech Transcription Shimaa Ahmed, Amrita Roy Chowdhury, Kassem Fawaz, and ...

USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems

USENIX Security '21 - Double-Cross Attacks: Subverting Active Learning Systems

USENIX Security

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

USENIX Security '24 - Fast and Private Inference of Deep Neural Networks by Co-designing...

Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Abdulrahman Diaa, Lucas Fenaux, ...

USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search

USENIX Security '20 - SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search

SANNS: Scaling Up

USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems

USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems

PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems R. Joseph Connor, Tyler McDaniel, Jared M. Smith, and Max ...

On the Difficulty of Defending Self-Supervised Learning against Model Extraction (ICML 2022)

On the Difficulty of Defending Self-Supervised Learning against Model Extraction (ICML 2022)

Self-Supervised

USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and

USENIX Security '19 - Back to the Whiteboard: a Principled Approach for the Assessment and

Back

USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity

USENIX Security '22 - Exploring the Security Boundary of Data Reconstruction via Neuron Exclusivity

USENIX Security

Model Stealing Attacks Against Inductive Graph Neural Networks

Model Stealing Attacks Against Inductive Graph Neural Networks

Graph neural network is good at handling graph data and have been applied by many big components once the

USENIX Security '21 - An Investigation of the Android Kernel Patch Ecosystem

USENIX Security '21 - An Investigation of the Android Kernel Patch Ecosystem

An Investigation of the Android Kernel Patch Ecosystem Zheng Zhang, UC Riverside; Hang Zhang and Zhiyun Qian, UC Riverside ...

USENIX Security '24 - CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect...

USENIX Security '24 - CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect...

CalcuLatency: Leveraging Cross-Layer Network Latency Measurements

USENIX ATC '24 - Conspirator: SmartNIC-Aided Control Plane for Distributed ML Workloads

USENIX ATC '24 - Conspirator: SmartNIC-Aided Control Plane for Distributed ML Workloads

Conspirator: SmartNIC-Aided Control Plane for Distributed ML Workloads Yunming Xiao, Northwestern University; Diman Zad ...