Membership Inference Attacks by Exploiting Loss Trajectory Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31 2022.08.31 2025.05.28 Literature Database
Fraud Dataset Benchmark and Applications Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22 2022.08.30 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 2022.08.30 2025.05.28 Literature Database
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30 2022.08.30 2025.05.28 Literature Database
Reducing Certified Regression to Certified Classification for General Poisoning Attacks Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29 2022.08.29 2025.05.28 Literature Database
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29 2022.08.29 2025.05.28 Literature Database
Towards Adversarial Purification using Denoising AutoEncoders Authors: Dvij Kalaria, Aritra Hazra, Partha Pratim Chakrabarti | Published: 2022-08-29 2022.08.29 2025.05.28 Literature Database
Understanding the Limits of Poisoning Attacks in Episodic Reinforcement Learning Authors: Anshuka Rangi, Haifeng Xu, Long Tran-Thanh, Massimo Franceschetti | Published: 2022-08-29 2022.08.29 2025.05.28 Literature Database
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 2022.08.29 2025.05.28 Literature Database
Overparameterization from Computational Constraints Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15 2022.08.27 2025.05.28 Literature Database