Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02 Model InterpretabilityModel Performance EvaluationExperimental Validation 2022.09.02 2025.05.28 Literature Database
CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01 Model Performance EvaluationExperimental ValidationHierarchical Classification Methods 2022.09.01 2025.05.28 Literature Database
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31 Application of XAIDataset GenerationModel Interpretability 2022.08.31 2025.05.28 Literature Database
Membership Inference Attacks by Exploiting Loss Trajectory Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31 Membership InferenceModel ArchitectureAdversarial attack 2022.08.31 2025.05.28 Literature Database
Fraud Dataset Benchmark and Applications Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22 Dataset GenerationFeature Importance Analysis 2022.08.30 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 Adversarial ExampleAdversarial attackOptimization Methods 2022.08.30 2025.05.28 Literature Database
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30 Attack DetectionFeature Importance AnalysisVulnerability detection 2022.08.30 2025.05.28 Literature Database
Reducing Certified Regression to Certified Classification for General Poisoning Attacks Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29 PoisoningModel ArchitectureRobust Regression 2022.08.29 2025.05.28 Literature Database
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29 Reward Mechanism DesignOptimization ProblemMachine Learning Technology 2022.08.29 2025.05.28 Literature Database