Literature Database

Data-Free Model Extraction Attacks in the Context of Object Detection

Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09
Dataset Generation
Model Extraction Attack
Adversarial Example

A Feature Set of Small Size for the PDF Malware Detection

Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10
Watermarking
Model Performance Evaluation
Feature Selection Method

Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper

Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09
AI Compliance
Automation of Cybersecurity
Data Management System

VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model

Authors: Tianyu Chen, Lin Li, Liuchuan Zhu, Zongyang Li, Xueqing Liu, Guangtai Liang, Qianxiang Wang, Tao Xie | Published: 2023-08-09 | Updated: 2024-05-18
CVE Information Extraction
Model Performance Evaluation
Challenges of Generative Models

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08
Cyber Attack
Machine Learning Technology

A Survey on Decentralized Federated Learning

Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08
Data Protection Method
Integration of Blockchain and FL
Poisoning

Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning

Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08
Watermarking
Adversarial Attack Methods
Defense Method

Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage

Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08
Data Protection Method
Membership Disclosure Risk
Machine Learning Technology

Breaking Speaker Recognition with PaddingBack

Authors: Zhe Ye, Diqun Yan, Li Dong, Kailai Shen | Published: 2023-08-08 | Updated: 2024-03-11
Watermarking
Backdoor Attack
Poisoning

Backdoor Federated Learning by Poisoning Backdoor-Critical Layers

Authors: Haomin Zhuang, Mingxian Yu, Hao Wang, Yang Hua, Jian Li, Xu Yuan | Published: 2023-08-08 | Updated: 2024-04-15
Backdoor Attack
Poisoning Attack
Defense Method