Deep learning for iris recognition: A survey

K Nguyen, H Proença, F Alonso-Fernandez - ACM Computing Surveys, 2024 - dl.acm.org
In this survey, we provide a comprehensive review of more than 200 articles, technical
reports, and GitHub repositories published over the last 10 years on the recent …

[HTML][HTML] Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects

C Wang, J Chen, Y Yang, X Ma, J Liu - Digital Communications and …, 2022 - Elsevier
Over the past years, the emergence of intelligent networks empowered by machine learning
techniques has brought great facilitates to different aspects of human life. However, using …

Blind backdoors in deep learning models

E Bagdasaryan, V Shmatikov - 30th USENIX Security Symposium …, 2021 - usenix.org
We investigate a new method for injecting backdoors into machine learning models, based
on compromising the loss-value computation in the model-training code. We use it to …

Hardware and software optimizations for accelerating deep neural networks: Survey of current trends, challenges, and the road ahead

M Capra, B Bussolino, A Marchisio, G Masera… - IEEE …, 2020 - ieeexplore.ieee.org
Currently, Machine Learning (ML) is becoming ubiquitous in everyday life. Deep Learning
(DL) is already present in many applications ranging from computer vision for medicine to …

Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead

M Shafique, M Naseer, T Theocharides… - IEEE Design & …, 2020 - ieeexplore.ieee.org
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …

Deep learning for edge computing: Current trends, cross-layer optimizations, and open research challenges

A Marchisio, MA Hanif, F Khalid… - 2019 IEEE Computer …, 2019 - ieeexplore.ieee.org
In the Machine Learning era, Deep Neural Networks (DNNs) have taken the spotlight, due to
their unmatchable performance in several applications, such as image processing, computer …

Towards energy-efficient and secure edge AI: A cross-layer framework ICCAD special session paper

M Shafique, A Marchisio, RVW Putra… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
The security and privacy concerns along with the amount of data that is required to be
processed on regular basis has pushed processing to the edge of the computing systems …

P3: Privacy-Preserving Scheme Against Poisoning Attacks in Mobile-Edge Computing

P Zhao, H Huang, X Zhao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mobile-edge computing (MEC) has emerged to enable users to offload their location data
into the MEC server, and at the same time, the MEC server executes the location-aware data …

Qusecnets: Quantization-based defense mechanism for securing deep neural network against adversarial attacks

F Khalid, H Ali, H Tariq, MA Hanif… - 2019 IEEE 25th …, 2019 - ieeexplore.ieee.org
Adversarial examples have emerged as a significant threat to machine learning algorithms,
especially to the convolutional neural networks (CNNs). In this paper, we propose two …

Building robust machine learning systems: Current progress, research challenges, and opportunities

JJ Zhang, K Liu, F Khalid, MA Hanif… - Proceedings of the 56th …, 2019 - dl.acm.org
Machine learning, in particular deep learning, is being used in almost all the aspects of life
to facilitate humans, specifically in mobile and Internet of Things (IoT)-based applications …