Literature Database

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19
Security Analysis
Expert Opinion Collection
Feature Importance Analysis

MUD-PQFed: Towards Malicious User Detection in Privacy-Preserving Quantized Federated Learning

Authors: Hua Ma, Qun Li, Yifeng Zheng, Zhi Zhang, Xiaoning Liu, Yansong Gao, Said F. Al-Sarawi, Derek Abbott | Published: 2022-07-19
Attack Methods against DFL
Privacy Enhancing Technology
Poisoning

FLAIR: Federated Learning Annotated Image Repository

Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18
Data Origins and Evolution
Evaluation of Technological Novelty
Hierarchical Classification Methods

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling

Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18
Algorithm Design
Security Assurance
State Estimation Method

Using Anomaly Detection to Detect Poisoning Attacks in Federated Learning Applications

Authors: Ali Raza, Shujun Li, Kim-Phuc Tran, Ludovic Koehl, Kim Duc Tran | Published: 2022-07-18 | Updated: 2025-03-25
Poisoning
Malicious Client
Detection of Poisonous Data

Towards Automated Classification of Attackers’ TTPs by combining NLP with ML Techniques

Authors: Clemens Sauerwein, Alexander Pfohl | Published: 2022-07-18
Text Extraction Method
Training Data Generation
Information Hiding Techniques

Security and Safety Aspects of AI in Industry Applications

Authors: Hans Dermot Doran | Published: 2022-07-16
Security Analysis
Training Protocol
Model Architecture

Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees

Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16
Privacy Protection Method
Information-Theoretic Privacy
Speech Recognition Process

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15
Algorithm Design
Privacy Protection Method
Trust Evaluation Module

Mobile Keystroke Biometrics Using Transformers

Authors: Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales | Published: 2022-07-15 | Updated: 2022-10-04
Algorithm Design
System Observability
Simulation Result Evaluation