The privacy issue of counterfactual explanations: explanation linkage attacks Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21 2022.10.21 2025.05.28 Literature Database
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 2022.10.21 2025.05.28 Literature Database
Extracted BERT Model Leaks More Information than You Think! Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31 2022.10.21 2025.05.28 Literature Database
New data poison attacks on machine learning classifiers for mobile exfiltration Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20 2022.10.20 2025.05.28 Literature Database
Do Software Security Practices Yield Fewer Vulnerabilities? Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15 2022.10.20 2025.05.28 Literature Database
Proof of Unlearning: Definitions and Instantiation Authors: Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang | Published: 2022-10-20 | Updated: 2022-10-21 2022.10.20 2025.05.28 Literature Database
How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers Authors: Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou | Published: 2022-10-20 | Updated: 2024-02-02 2022.10.20 2025.05.28 Literature Database
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 2022.10.20 2025.05.28 Literature Database
Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01 2022.10.19 2025.05.28 Literature Database
An Empirical Analysis of SMS Scam Detection Systems Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19 2022.10.19 2025.05.28 Literature Database