Literature Database

Learn to Adapt: Robust Drift Detection in Security Domain

Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15
Drift Detection Method
Performance Evaluation Metrics
Adversarial Learning

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15
Access Control
Security Analysis
Data Selection Strategy

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15
Robustness
Adversarial Example
Adversarial Attack Methods

On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective

Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02
Sample Complexity
Robustness
Deep Learning Method

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13
Training Protocol
Adversarial Attack Methods
Deep Learning Method

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12
Malware Detection
Adversarial Example
Deep Learning Method

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12
Performance Evaluation
Adversarial Attack Methods
Deep Learning Method

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11
Federated Learning
Weight Update Method
Defense Effectiveness Analysis

Bayesian Estimation of Differential Privacy

Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15
Privacy Assessment
Bayesian Security
Deep Learning Method

Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging

Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11
Graph Construction
Privacy Assessment
Communication Model