Deep neural networks (DNNs) have achieved tremendous success in various
...
Backdoor (Trojan) attacks are an important type of adversarial exploit
a...
Deep neural networks are vulnerable to backdoor attacks (Trojans), where...
We aim to resolve this problem by introducing a comprehensive distribute...
Considering the problem of resource allocation for potentially complex a...
A Backdoor attack (BA) is an important type of adversarial attack agains...
Backdoor attacks (BAs) are an emerging threat to deep neural network
cla...
Backdoor (Trojan) attacks are emerging threats against deep neural netwo...
Backdoor attacks (BA) are an emerging threat to deep neural network
clas...
We demonstrate a backdoor attack on a deep neural network used for
regre...
We describe a gradient-based method to discover local error maximizers o...
Consider a message processing system whose objective is to produce the m...
Data Poisoning (DP) is an effective attack that causes trained classifie...
Deep Neural Networks (DNNs) have been shown vulnerable to adversarial
(T...
Age of Information (AoI) has emerged as an important quality-of-service
...
When designing a message transmission system, from the point of view of
...
Vulnerability of 3D point cloud (PC) classifiers has become a grave conc...
Backdoor attacks (BAs) are an emerging form of adversarial attack typica...
Backdoor data poisoning is an emerging form of adversarial attack usuall...
The public cloud offers a myriad of services which allows its tenants to...
Recently, a special type of data poisoning (DP) attack, known as a backd...
We provide a local class purity theorem for Lipschitz continuous,
half-r...
Recently, a special type of data poisoning (DP) attack targeting Deep Ne...
We consider a public content caching system that is shared by a number o...
With the wide deployment of machine learning (ML) based systems for a va...
The idea behind the recently introduced "age of information" performance...
We consider the problem of scheduling "serverless computing" instances s...
Naive Bayes spam filters are highly susceptible to data poisoning attack...
This paper addresses detection of a reverse engineering (RE) attack targ...
Using tiny, equal-sized tasks (Homogeneous microTasking, HomT) has long ...
A queueing system handling a sequence of message arrivals is considered ...
We consider two types of problems associated with a bufferless server wi...
In the following, we present example illustrative and experimental resul...
In the following, we present example illustrative and experimental resul...
Efficient and fair allocation of multiple types of resources is a crucia...
A significant threat to the recent, wide deployment of machine learning-...
We consider a cloud based multiserver system consisting of a set of repl...
In this part of the paper, we obtain analytical results for the case tha...
We first consider the static problem of allocating resources to ( i.e. ,...
We consider the problem of scheduling a group of heterogeneous, distribu...
Many different caching mechanisms have been previously proposed, explori...