Literature Database

Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models

Authors: Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood | Published: 2022-09-22
Privacy Assessment
Model Extraction Attack
Face Recognition System

You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22
Dataset Generation
Privacy Assessment
User Authentication System

Talking Trojan: Analyzing an Industry-Wide Disclosure

Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22
Open Source Disclosure
Security label
Vulnerability Attack Method

Android Private Compute Core Architecture

Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22
Privacy Protection
Privacy Technique
Dynamic Access Control

Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study

Authors: Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud | Published: 2022-09-21
Algorithm
Dataset Generation
Evaluation of Technological Novelty

Federated Learning from Pre-Trained Models: A Contrastive Learning Approach

Authors: Yue Tan, Guodong Long, Jie Ma, Lu Liu, Tianyi Zhou, Jing Jiang | Published: 2022-09-21
Framework
Poisoning
Improvement of Learning

Generate rather than Retrieve: Large Language Models are Strong Context Generators

Authors: Wenhao Yu, Dan Iter, Shuohang Wang, Yichong Xu, Mingxuan Ju, Soumya Sanyal, Chenguang Zhu, Michael Zeng, Meng Jiang | Published: 2022-09-21 | Updated: 2023-01-25
RAG
Data Generation Method
Knowledge Extraction Method

Audit and Improve Robustness of Private Neural Networks on Encrypted Data

Authors: Jiaqi Xue, Lei Xu, Lin Chen, Weidong Shi, Kaidi Xu, Qian Lou | Published: 2022-09-20
DNN IP Protection Method
Privacy Technique

Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung | Published: 2022-09-20 | Updated: 2024-06-12
Model Performance Evaluation
Improvement of Learning
Vulnerability Mitigation Technique

Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19
Model Performance Evaluation
Improvement of Learning
Performance Evaluation