Literature Database

On the Robustness of Dataset Inference

Authors: Sebastian Szyller, Rui Zhang, Jian Liu, N. Asokan | Published: 2022-10-24 | Updated: 2023-06-19
Membership Inference
Adversarial Training
Statistical Hypothesis Testing

Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions

Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24
IoT Security Risks
Privacy Protection
Deep Learning Technology

Perfectly Secure Steganography Using Minimum Entropy Coupling

Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30
Privacy Technique
Watermark Evaluation
Communication Model

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24
Poisoning
Reward Mechanism Design
Evaluation Method

Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman | Published: 2022-10-23
Integration of Blockchain and FL
Fraudulent Transaction
Reward Mechanism Design

Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication

Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04
Dataset Generation
Model Design
Communication Model

The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21
Counterfactual Explanation
Privacy Violation
Evaluation Method

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Extracted BERT Model Leaks More Information than You Think!

Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31
Security Analysis
Privacy Risk Management
Membership Inference

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20
Backdoor Attack
Poisoning
Adversarial Attack Methods