SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11 DNN IP Protection MethodAdversarial Attack MethodsStructural Attack 2023.01.11 2025.05.28 Literature Database
Chatbots in a Honeypot World Authors: Forrest McKee, David Noever | Published: 2023-01-10 Cyber AttackHoneypot TechnologyProgram Analysis 2023.01.10 2025.05.28 Literature Database
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12 DNN IP Protection MethodPrivacy Enhancing TechnologyPoisoning 2023.01.09 2025.05.28 Literature Database
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Authors: Arshiya Khan, Chase Cotton | Published: 2023-01-09 IoT Device IdentificationPrompt InjectionMalicious Package Detection 2023.01.09 2025.05.28 Literature Database
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11 Data Privacy AssessmentPrivacy Enhancing TechnologyProgram Analysis 2023.01.09 2025.05.28 Literature Database
Introducing Model Inversion Attacks on Automatic Speaker Recognition Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09 Privacy Enhancing TechnologyMembership InferenceSpeech Synthesis Technology 2023.01.09 2025.05.28 Literature Database
IronForge: An Open, Secure, Fair, Decentralized Federated Learning Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07 Privacy Enhancing TechnologyPrompt InjectionReward Mechanism Design 2023.01.07 2025.05.28 Literature Database
Linear and non-linear machine learning attacks on physical unclonable functions Authors: Michael Lachner | Published: 2023-01-06 WatermarkingPoisoningPrinciple of Optical PUF 2023.01.06 2025.05.28 Literature Database
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24 Backdoor AttackPoisoningAttack Method 2023.01.06 2025.05.28 Literature Database
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection Authors: Caroline Strickland, Chandrika Saha, Muhammad Zakar, Sareh Nejad, Noshin Tasnim, Daniel Lizotte, Anwar Haque | Published: 2023-01-05 DoS AttackTraining Data GenerationDeep Reinforcement Learning 2023.01.05 2025.05.28 Literature Database