Literature Database

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
Dataset Generation
Performance Evaluation
Vulnerability Management

Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile

Authors: Tyler LeBlond, Joseph Munoz, Fred Lu, Maya Fuchs, Elliott Zaresky-Williams, Edward Raff, Brian Testa | Published: 2023-06-27
Privacy Assessment
Convergence Guarantee
Convergence Property

Developing and Deploying Security Applications for In-Vehicle Networks

Authors: Samuel C Hollifield, Pablo Moriano, William L Lambert, Joel Asiamah, Isaac Sikkema, Michael D Iannacone | Published: 2023-06-27
Microcontroller
Threat modeling
Vehicle Network

Your Attack Is Too DUMB: Formalizing Attacker Scenarios for Adversarial Transferability

Authors: Marco Alecci, Mauro Conti, Francesco Marchiori, Luca Martinelli, Luca Pajola | Published: 2023-06-27
Malware Classification
Adversarial Example
Adversarial Attack Methods

[Re] Double Sampling Randomized Smoothing

Authors: Aryan Gupta, Sarthak Gupta, Abhay Kumar, Harsh Dugar | Published: 2023-06-27
Malware Classification
Malware Detection Method
Robustness Evaluation

Classification and Explanation of Distributed Denial-of-Service (DDoS) Attack Detection using Machine Learning and Shapley Additive Explanation (SHAP) Methods

Authors: Yuanyuan Wei, Julian Jang-Jaccard, Amardeep Singh, Fariza Sabrina, Seyit Camtepe | Published: 2023-06-27
XAI (Explainable AI)
Network Threat Detection
Malware Classification

Optimal Differentially Private Model Training with Public Data

Authors: Andrew Lowy, Zeman Li, Tianjian Huang, Meisam Razaviyayn | Published: 2023-06-26 | Updated: 2024-09-09
Privacy Protection Method
Optimization Problem
Federated Learning

Towards Sybil Resilience in Decentralized Learning

Authors: Thomas Werthenbach, Johan Pouwelse | Published: 2023-06-26
Poisoning
Poisoning Attack
Federated Learning

Are aligned neural networks adversarially aligned?

Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt | Published: 2023-06-26 | Updated: 2024-05-06
Prompt Injection
Adversarial Example
Adversarial Attack Methods

Private Federated Learning in Gboard

Authors: Yuanbo Zhang, Daniel Ramage, Zheng Xu, Yanxiang Zhang, Shumin Zhai, Peter Kairouz | Published: 2023-06-26
Privacy Protection
Federated Learning