Literature Database

Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling

Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13
Data Privacy Assessment
Data Protection Method
Privacy Technique

SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning

Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13
Poisoning
Malicious Client
Federated Learning

Intrusion Detection: A Deep Learning Approach

Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13
LSTM Model Performance Evaluation
Classification Pattern Analysis
Automated Intrusion Detection System

“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter

Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12
Data Privacy Assessment
Hyperparameter Tuning
Privacy Technique

Gaussian Membership Inference Privacy

Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26
Privacy Technique
Hypothesis Testing
Statistical Testing

On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12
Role of MLSecOps
Cybersecurity
Malware Detection

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning

Authors: Ghada Almashaqbeh, Zahra Ghodsi | Published: 2023-06-12
Privacy Technique
Malicious Client
Federated Learning

Augmenting Greybox Fuzzing with Generative AI

Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11
Fuzzing
Prompt Injection
Performance Evaluation

Efficient Skip Connections Realization for Secure Inference on Encrypted Data

Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11
Privacy Technique
Real-Time Inference
Performance Evaluation