Literature Database

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31
Membership Inference
Trust Evaluation
Communication Model

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23
Identification of Signature Key
Selection Method
Hierarchical Classification Methods

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30
Attack Methods against DFL
Adversarial Attack Methods

Evaluating Automated Driving Planner Robustness against Adversarial Influence

Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29
Cyber Threat
Trust Evaluation
Vehicle Network

A Blessing of Dimensionality in Membership Inference through Regularization

Authors: Jasper Tan, Daniel LeJeune, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-05-27 | Updated: 2023-04-14
Training Protocol
Privacy Assessment
Loss Term

Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence

Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27
Privacy Assessment
Framework
Watermark Evaluation

How to Peel a Million: Validating and Expanding Bitcoin Clusters

Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27
Data Management System
Transaction Profit and Performance
Transparency and Verification

Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic Hypervisor

Authors: Manabu Hirano, Ryotaro Kobayashi | Published: 2022-05-27 | Updated: 2022-08-18
Cyber Threat
Data Management System
Malware Detection Method

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27
Security Assurance
Trojan Detection
Feature Extraction Method