Literature Database

DI-NIDS: Domain Invariant Network Intrusion Detection System

Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15
Performance Evaluation
Machine Learning Technology
Deep Learning Method

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning

Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14
Backdoor Attack
Attack Method
Self-Supervised Learning

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09
Dataset Generation
Performance Evaluation
Generative Adversarial Network

Federated Learning for Tabular Data: Exploring Potential Risk to Privacy

Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13
Privacy Risk Management
Poisoning
Generative Adversarial Network

COLLIDER: A Robust Training Framework for Backdoor Data

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13
Core Set Selection Method
Deep Learning Method
Defense Method

Anomaly Detection via Federated Learning

Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani | Published: 2022-10-12
Model Communication
Intrusion Detection System
Performance Evaluation Metrics

BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces

Authors: Adam Dorian Wong | Published: 2022-10-12 | Updated: 2022-10-28
DNN IP Protection Method
Security Assurance
Challenges of Generative Models

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11
Energy Management
Intrusion Detection System
Machine Learning Method

Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization

Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11
Poisoning
Performance Evaluation Metrics
Adversarial attack

Do you pay for Privacy in Online learning?

Authors: Amartya Sanyal, Giorgia Ramponi | Published: 2022-10-10
Online Learning
Privacy Enhancing Technology