Data and model dependencies of membership inference attack SM Tonni, D Vatsalan, F Farokhi, D Kaafar, Z Lu, G Tangari arXiv preprint arXiv:2002.06856, 2020 | 18 | 2020 |
BFM: a forward backward string matching algorithm with improved shifting for information retrieval MDO Al-Faruk, KMA Hussain, MDA Shahriar, SM Tonni International Journal of Information Technology 12 (2), 479-483, 2020 | 9 | 2020 |
Securing big data efficiently through microaggregation technique SM Tonni, MZ Rahman, S Parvin, A Gawanmeh 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 9 | 2017 |
IDT: Dual-Task Adversarial Attacks for Privacy Protection P Faustini, SM Tonni, A McIver, Q Xu, M Dras arXiv preprint arXiv:2406.19642, 2024 | | 2024 |
What Learned Representations and Influence Functions Can Tell Us About Adversarial Examples SM Tonni, M Dras Findings of the Association for Computational Linguistics: IJCNLP-AACL 2023 …, 2023 | | 2023 |
Directional Privacy for Deep Learning P Faustini, N Fernandes, T Shakila, A McIver, M Dras arXiv preprint arXiv:2211.04686, 2022 | | 2022 |
Information leakage in machine learning models SM Tonni Macquarie University, 2022 | | 2022 |
Protecting Big Data Through Microaggregation Technique for Secured Cyber-Physical Systems SM Tonni, S Parvin, A Gawanmeh, J Jackson Cyber-Physical Systems for Next-Generation Networks, 99-120, 2018 | | 2018 |