Surveying neuro-symbolic approaches for reliable artificial intelligence of things
Abstract The integration of Artificial Intelligence (AI) with the Internet of Things (IoT), known
as the Artificial Intelligence of Things (AIoT), enhances the devices' processing and analysis …
as the Artificial Intelligence of Things (AIoT), enhances the devices' processing and analysis …
Trustworthy graph neural networks: Aspects, methods and trends
Graph neural networks (GNNs) have emerged as a series of competent graph learning
methods for diverse real-world scenarios, ranging from daily applications like …
methods for diverse real-world scenarios, ranging from daily applications like …
Model inversion attacks against collaborative inference
The prevalence of deep learning has drawn attention to the privacy protection of sensitive
data. Various privacy threats have been presented, where an adversary can steal model …
data. Various privacy threats have been presented, where an adversary can steal model …
A survey of neural trojan attacks and defenses in deep learning
Artificial Intelligence (AI) relies heavily on deep learning-a technology that is becoming
increasingly popular in real-life applications of AI, even in the safety-critical and high-risk …
increasingly popular in real-life applications of AI, even in the safety-critical and high-risk …
Fingerprinting deep neural networks globally via universal adversarial perturbations
In this paper, we propose a novel and practical mechanism which enables the service
provider to verify whether a suspect model is stolen from the victim model via model …
provider to verify whether a suspect model is stolen from the victim model via model …
Robust watermarking for deep neural networks via bi-level optimization
Deep neural networks (DNNs) have become state-of-the-art in many application domains.
The increasing complexity and cost for building these models demand means for protecting …
The increasing complexity and cost for building these models demand means for protecting …
Attacking and protecting data privacy in edge–cloud collaborative inference systems
Benefiting from the advance of deep learning (DL) technology, Internet-of-Things (IoT)
devices and systems are becoming more intelligent and multifunctional. They are expected …
devices and systems are becoming more intelligent and multifunctional. They are expected …
Are you stealing my model? sample correlation for fingerprinting deep neural networks
An off-the-shelf model as a commercial service could be stolen by model stealing attacks,
posing great threats to the rights of the model owner. Model fingerprinting aims to verify …
posing great threats to the rights of the model owner. Model fingerprinting aims to verify …
Data security issues in deep learning: Attacks, countermeasures, and opportunities
Benefiting from the advancement of algorithms in massive data and powerful computing
resources, deep learning has been explored in a wide variety of fields and produced …
resources, deep learning has been explored in a wide variety of fields and produced …
Actionbert: Leveraging user actions for semantic understanding of user interfaces
As mobile devices are becoming ubiquitous, regularly interacting with a variety of user
interfaces (UIs) is a common aspect of daily life for many people. To improve the …
interfaces (UIs) is a common aspect of daily life for many people. To improve the …