Literature Database

REAP: A Large-Scale Realistic Adversarial Patch Benchmark

Authors: Nabeel Hingun, Chawin Sitawarin, Jerry Li, David Wagner | Published: 2022-12-12 | Updated: 2023-08-18
DNN IP Protection Method
Watermarking
Traffic Sign Classification

A Dependable Hybrid Machine Learning Model for Network Intrusion Detection

Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27
Model Design and Accuracy
Feature Selection Method
Evaluation Method

XRand: Differentially Private Defense against Explanation-Guided Attacks

Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai | Published: 2022-12-08 | Updated: 2022-12-14
Privacy Assessment
Method for Providing Explainability while Keeping Model Information Confidential
Differential Privacy

Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing

Authors: Mohammad Malekzadeh, Deniz Gunduz | Published: 2022-12-08 | Updated: 2024-10-01
Privacy Risk Management
Privacy Assessment
Reconstruction Durability

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13
Security Assurance
Software Security
Evaluation Method

Reconstructing Training Data from Model Gradient, Provably

Authors: Zihan Wang, Jason D. Lee, Qi Lei | Published: 2022-12-07 | Updated: 2023-06-10
Algorithm Design
Privacy Risk Management
Reconstruction Durability

Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning

Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12
Privacy Protection Method
Model Selection
Condition Monitoring

On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28
Subpopulation Characteristics
Membership Disclosure Risk
Adversarial Example

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31
Privacy Protection Method
Privacy Assessment
Face Recognition Method

Pareto Regret Analyses in Multi-objective Multi-armed Bandit

Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30
Algorithm Design
Online Learning
Optimization Problem