The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13 Privacy Enhancing TechnologyRisk Assessment MethodConvergence Property 2023.03.13 2025.05.28 Literature Database
A Survey on Explainable Artificial Intelligence for Cybersecurity Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11 XAI (Explainable AI)CybersecurityExplainability 2023.03.07 2025.05.28 Literature Database
Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06 Data Contamination DetectionPoisoningPoisoning Attack 2023.03.07 2025.05.28 Literature Database
Certified Robust Neural Networks: Generalization and Corruption Resistance Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18 Poisoning AttackLoss FunctionAdversarial Example 2023.03.03 2025.05.28 Literature Database
Automated Machine Learning for Deep Learning based Malware Detection Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-03-03 | Updated: 2023-11-03 Hyperparameter TuningMalware DetectionModel Performance Evaluation 2023.03.03 2025.05.28 Literature Database
Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15 Data CollectionModel Performance EvaluationVulnerability Prediction 2023.02.27 2025.05.28 Literature Database
From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12 Privacy Enhancing TechnologyConvergence AnalysisFixed Point Iteration Method 2023.02.24 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database