Literature Database

On False Data Injection Attack against Building Automation Systems

Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25
Attack Evaluation
Attack Pattern Extraction
Machine Learning Method

Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption

Authors: Syed Imtiaz Ahamed, Vadlamani Ravi | Published: 2022-08-04
CKKS Scheme
Medical Image Analysis
Machine Learning Method

Node Copying: A Random Graph Model for Effective Graph Sampling

Authors: Florence Regol, Soumyasundar Pal, Jianing Sun, Yingxue Zhang, Yanhui Geng, Mark Coates | Published: 2022-08-04
Class Mapping Method
Data Generation
Optimization Methods

Design of secure and robust cognitive system for malware detection

Authors: Sanket Shukla | Published: 2022-08-03
Malware Detection
Robustness
Adversarial Example

How Much Privacy Does Federated Learning with Secure Aggregation Guarantee?

Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr | Published: 2022-08-03
Secure Aggregation
Privacy Leakage
Efficiency of Distributed Learning

A New Implementation of Federated Learning for Privacy and Security Enhancement

Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03
Byzantine Consensus Mechanism
Privacy Leakage
Machine Learning

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17
Privacy Leakage
Membership Inference
Machine Learning

DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning

Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31
DNN IP Protection Method
Attack Detection
Adversarial Example

Verifiable Encodings for Secure Homomorphic Analytics

Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04
Privacy Technique
Performance Evaluation Metrics
Evaluation Method

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27
Dataset Generation
Link Emulation
Attackers and Malicious Devices