usenix security '23 - freeeagle: detecting complex neural trojans in data-free cases
Published 7 months ago • 36 plays • Length 11:00Download video MP4
Download video MP3
Similar videos
-
12:32
usenix security '23 - a data-free backdoor injection approach in neural networks
-
12:11
usenix security '23 - jinn: hijacking safe programs with trojans
-
12:52
usenix security '23 - trojan source: invisible vulnerabilities
-
9:34
usenix security '23 - icspatch: automated vulnerability localization and non-intrusive...
-
14:56
install nessus for free and scan for vulnerabilities (new way)
-
2:56
watch this russian hacker break into our computer in minutes | cnbc
-
11:09
usenix security '22 - ltrack: stealthy tracking of mobile phones in lte
-
14:46
usenix security '23 - neuropots: realtime proactive defense against bit-flip attacks in neural...
-
10:05
usenix security '22 - cheetah: lean and fast secure two-party deep neural network inference
-
12:47
usenix security '23 - aliasing backdoor attacks on pre-trained models
-
13:56
usenix security '22 - membership inference attacks and defenses in neural network pruning
-
12:19
usenix security '23 - precise and generalized robustness certification for neural networks
-
11:29
usenix security '23 - sqirl: grey-box detection of sql injection vulnerabilities using...
-
12:47
usenix security '23 - enigmap: external-memory oblivious map for secure enclaves
-
10:58
usenix security '20 - high accuracy and high fidelity extraction of neural networks
-
10:01
usenix security '23 - machine-checking multi-round proofs of shuffle: terelius-wikstrom and...
-
10:17
usenix security '23 - carpetfuzz: automatic program option constraint extraction from...
-
11:57
usenix security '23 - the maginot line: attacking the boundary of dns caching protection
-
11:16
usenix security '23 - a hybrid alias analysis and its application to global variable protection...
-
11:30
usenix security '23 - network detection of interactive ssh impostors using deep learning
-
10:47
usenix security '23 - tubes among us: analog attack on automatic speaker identification