{SoK}: All You Need to Know About {On-Device}{ML} Model Extraction-The Gap Between Research and Practice

T Nayan, Q Guo, M Al Duniawi, M Botacin… - 33rd USENIX Security …, 2024 - usenix.org
On-device ML is increasingly used in different applications. It brings convenience to offline
tasks and avoids sending user-private data through the network. On-device ML models are …

[PDF][PDF] An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform.

K Meenakshi, G Maragatham - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
Deep Learning is one of the most popular computer science techniques, with applications in
natural language processing, image processing, pattern identification, and various other …

[HTML][HTML] Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems

Y Harbi, K Medani, C Gherbi, Z Aliouat, S Harous - Sensors, 2024 - mdpi.com
Machine learning (ML) represents one of the main pillars of the current digital era,
specifically in modern real-world applications. The Internet of Things (IoT) technology is …

Assessment of student attentiveness to e-learning by monitoring behavioural elements

NA Shah, K Meenakshi, A Agarwal… - 2021 International …, 2021 - ieeexplore.ieee.org
In the current scenario of the world, most of the learning has been shifted to e-learning
modes like online classes. In a live class, a teacher is able to constantly monitor the students …

[PDF][PDF] A self supervised defending mechanism against adversarial iris attacks based on wavelet transform

K Meenakshi, G Maragatham - International Journal of Advanced …, 2021 - researchgate.net
In biometric applications, deep neural networks have presented significant improvements.
However, when presenting carefully designed input training data known as adversarial …

Bagging as Defence Mechanism Against Adversarial Attack

M Ahmed, MA Tahir - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
With the gaining popularity of Artificial intelligence and its adoption by organizations in their
day-to-day business operations, it is becoming increasingly important to defend machine …

Fuzzy rules-based Data Analytics and Machine Learning for Prognosis and Early Diagnosis of Coronary Heart Disease

A Ali A, F Khan AB, J Ramakrishnan - Journal of Information and …, 2024 - hrcak.srce.hr
Sažetak Globally, cardiovascular diseases stand as the primary cause of mortality. In
response to the imperative to enhance operational efficiency and reduce expenses …

AdvIris: a hybrid approach to detecting adversarial iris examples using wavelet transform

K Meenakshi, G Maragatham - International Journal of Speech …, 2022 - Springer
Deep neural networks have shown significant progress in biometric applications. Deep
learning networks are particularly vulnerable to Adversarial examples where adversarial …

DeepIris: An ensemble approach to defending Iris recognition classifiers against Adversarial Attacks

SR Tamizhiniyan, A Ojha, K Meenakshi… - 2021 International …, 2021 - ieeexplore.ieee.org
Despite being known for their robust performance in the biometrics domain, Deep
Convolutional Neural Networks always face a high risk of being fooled by precisely …

A comprehensive survey on iris presentation attacks and detection based on generative adversarial network

K Meenakshi, G Maragatham - 2020 International Conference …, 2020 - ieeexplore.ieee.org
In Biometric traits, Iris plays an important role in person authentication because it has
complex structure and the patterns have unique and rich features as compared to other traits …