Literature Database

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
Risk Management
Attacker Behavior Analysis
Threat Model

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30
DNN IP Protection Method
Security Assurance
Privacy Risk Management

IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31
Algorithm Design
Efficient Proof System
Adversarial Learning

Private Graph Extraction via Feature Explanations

Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02
Attack Methods against DFL
Privacy Risk Management
Adversarial Learning

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
Cyber Threat
Software Security
Vulnerability Management

Approximate Data Deletion in Generative Models

Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29
Algorithm Design
Data Leakage
Hypothesis Testing

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model

Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29
DNN IP Protection Method
Algorithm Design
Membership Inference

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection

CoAP-DoS: An IoT Network Intrusion Dataset

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29
DoS Attack
IoMT Security
Network Threat Detection

How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection

Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28
Algorithm Design
Adversarial Example
Computational Efficiency