Literature Database

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24
Algorithm
Time Window Analysis
Computational Efficiency

Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels

Authors: Hang Liu, Jia Yan, Ying-Jun Angela Zhang | Published: 2023-06-19 | Updated: 2023-12-25
Privacy Technique
Optimization Methods
Federated Learning

Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids

Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17
Algorithm
Deep Learning Method
Federated Learning

Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network

Authors: Fan Liu, Siqi Lai, Yansong Ning, Hao Liu | Published: 2023-06-17
Backdoor Attack
Federated Learning

Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo | Published: 2023-06-17 | Updated: 2024-02-08
Backdoor Attack
Poisoning
Federated Learning

Evaluating Superhuman Models with Consistency Checks

Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19
LLM Performance Evaluation
Algorithm
Evaluation Method

You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks

Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16
Membership Inference
Adversarial Example
Threat modeling

Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks

Authors: Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo | Published: 2023-06-16
Poisoning
Malware Propagation Means
Adversarial Spectrum Attack Detection

Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier

Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15
Data Collection
Threat modeling
Computational Efficiency

Inroads into Autonomous Network Defence using Explained Reinforcement Learning

Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15
Algorithm
Simulation Result Evaluation
Deep Learning Method