Literature Database

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19
Poisoning
Poisoning Attack
Federated Learning

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method

Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications

Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16
DoS Mitigation
Algorithm
Malicious Node Detection

ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software

Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15
Cyber Attack
Model Performance Evaluation
Threat modeling

Signed-Prompt: A New Approach to Prevent Prompt Injection Attacks Against LLM-Integrated Applications

Authors: Xuchen Suo | Published: 2024-01-15
LLM Security
Prompt Injection

Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2024-01-15 | Updated: 2024-01-23
Brier Score Evaluation Method
Trojan Detection
Quantification of Uncertainty

Quantum Privacy Aggregation of Teacher Ensembles (QPATE) for Privacy-preserving Quantum Machine Learning

Authors: William Watkins, Heehwan Wang, Sangyoon Bae, Huan-Hsin Tseng, Jiook Cha, Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2024-01-15
Privacy Protection Method
Quantum Framework
Quantum Machine Learning

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14
Cybersecurity
Security Analysis
Advancements in Medical IoT

LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts

Authors: Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun Chen | Published: 2024-01-14 | Updated: 2025-04-02
Smart Contract
Certified Robustness
Model Performance Evaluation

Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models

Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14
Privacy Protection Method
Poisoning
Watermark Evaluation