1 code implementation • 20 Aug 2021 • Zecheng He, Ruby B. Lee
Once an anomaly is detected, to reduce alert fatigue, CloudShield automatically distinguishes between benign programs, known attacks, and zero-day attacks, by examining the prediction error distributions.
no code implementations • 11 Mar 2021 • Guangyuan Hu, Zecheng He, Ruby B. Lee
Impostors are attackers who take over a smartphone and gain access to the legitimate user's confidential and private information.
no code implementations • 9 Aug 2018 • Zecheng He, Tianwei Zhang, Ruby B. Lee
Even small weight changes can be clearly reflected in the model outputs, and observed by the customer.
no code implementations • 5 Jul 2018 • Tianwei Zhang, Zecheng He, Ruby B. Lee
While it is prevalent to outsource model training and serving tasks in the cloud, it is important to protect the privacy of sensitive samples in the training dataset and prevent information leakage to untrusted third parties.