REAP: A Large-Scale Realistic Adversarial Patch Benchmark Authors: Nabeel Hingun, Chawin Sitawarin, Jerry Li, David Wagner | Published: 2022-12-12 | Updated: 2023-08-18 DNN IP Protection MethodWatermarkingTraffic Sign Classification 2022.12.12 2025.05.28 Literature Database
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27 Model Design and AccuracyFeature Selection MethodEvaluation Method 2022.12.08 2025.05.28 Literature Database
XRand: Differentially Private Defense against Explanation-Guided Attacks Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai | Published: 2022-12-08 | Updated: 2022-12-14 Privacy AssessmentMethod for Providing Explainability while Keeping Model Information ConfidentialDifferential Privacy 2022.12.08 2025.05.28 Literature Database
Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing Authors: Mohammad Malekzadeh, Deniz Gunduz | Published: 2022-12-08 | Updated: 2024-10-01 Privacy Risk ManagementPrivacy AssessmentReconstruction Durability 2022.12.08 2025.05.28 Literature Database
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database
Reconstructing Training Data from Model Gradient, Provably Authors: Zihan Wang, Jason D. Lee, Qi Lei | Published: 2022-12-07 | Updated: 2023-06-10 Algorithm DesignPrivacy Risk ManagementReconstruction Durability 2022.12.07 2025.05.28 Literature Database
Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12 Privacy Protection MethodModel SelectionCondition Monitoring 2022.12.07 2025.05.28 Literature Database
On the Discredibility of Membership Inference Attacks Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28 Subpopulation CharacteristicsMembership Disclosure RiskAdversarial Example 2022.12.06 2025.05.28 Literature Database
StyleGAN as a Utility-Preserving Face De-identification Method Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31 Privacy Protection MethodPrivacy AssessmentFace Recognition Method 2022.12.05 2025.05.28 Literature Database
Pareto Regret Analyses in Multi-objective Multi-armed Bandit Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30 Algorithm DesignOnline LearningOptimization Problem 2022.12.01 2025.05.28 Literature Database