Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 2022.09.14 2025.05.28 Literature Database
Data Privacy and Trustworthy Machine Learning Authors: Martin Strobel, Reza Shokri | Published: 2022-09-14 2022.09.14 2025.05.28 Literature Database
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 2022.09.14 2025.05.28 Literature Database
Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 2022.09.13 2025.05.28 Literature Database
A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 2022.09.13 2025.05.28 Literature Database
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 2022.09.12 2025.05.28 Literature Database
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 2022.09.12 2025.05.28 Literature Database
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13 2022.09.12 2025.05.28 Literature Database
Preserving Privacy in Federated Learning with Ensemble Cross-Domain Knowledge Distillation Authors: Xuan Gong, Abhishek Sharma, Srikrishna Karanam, Ziyan Wu, Terrence Chen, David Doermann, Arun Innanje | Published: 2022-09-10 2022.09.10 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 2022.09.09 2025.05.28 Literature Database