Feb. 9, 2022, 2:20 a.m. | Weiqi Peng, Jinghui Chen

cs.CR updates on arXiv.org arxiv.org

Owing much to the revolution of information technology, the recent progress
of deep learning benefits incredibly from the vastly enhanced access to data
available in various digital formats. However, in certain scenarios, people may
not want their data being used for training commercial models and thus studied
how to attack the learnability of deep learning models. Previous works on
learnability attack only consider the goal of preventing unauthorized
exploitation on the specific dataset but not the process of restoring the …

control lg lock

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Cyber Security Cloud Solution Architect

@ Microsoft | London, London, United Kingdom

Compliance Program Analyst

@ SailPoint | United States

Software Engineer III, Infrastructure, Google Cloud Security and Privacy

@ Google | Sunnyvale, CA, USA

Cryptography Expert

@ Raiffeisen Bank Ukraine | Kyiv, Kyiv city, Ukraine

Senior Cyber Intelligence Planner (15.09)

@ OCT Consulting, LLC | Washington, District of Columbia, United States