no code implementations • 5 Mar 2024 • Younghan Lee, Sohee Jun, Yungi Cho, Woorim Han, Hyungon Moon, Yunheung Paek
Most of those DL models are proprietary to the companies who thus strive to keep their private models safe from the model extraction attack (MEA), whose aim is to steal the model by training surrogate models.
1 code implementation • 5 Mar 2024 • Younghan Lee, Yungi Cho, Woorim Han, Ho Bae, Yunheung Paek
However, recent research proposed poisoning attacks that cause a catastrophic loss in the accuracy of the global model when adversaries, posed as benign clients, are present in a group of clients.
no code implementations • 6 Nov 2016 • Gyuwan Kim, Hayoon Yi, Jangho Lee, Yunheung Paek, Sungroh Yoon
In computer security, designing a robust intrusion detection system is one of the most fundamental and important problems.