Literature Database

On the (In)security of Peer-to-Peer Decentralized Machine Learning

Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10
Attack Methods against DFL
Privacy Technique
Privacy Leakage

Does Crypto Kill? Relationship between Electricity Consumption Carbon Footprints and Bitcoin Transactions

Authors: Altanai Bisht, Arielle Wilson, Zachary Jeffreys, Shadrokh Samavi | Published: 2022-05-16
Open Source Disclosure
Transaction Generation Method
Temperature Data

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

Authors: Dinil Mon Divakaran, Adam Oest | Published: 2022-05-16
Web Page Content Analysis
Cyber Attack
Phishing Detection

Attack vs Benign Network Intrusion Traffic Classification

Authors: M. Andrecut | Published: 2022-05-15
Performance Evaluation
Attack Detection
evaluation metrics

Representation learning with function call graph transformations for malware open set recognition

Authors: Jingyun Jia, Philip K. Chan | Published: 2022-05-13 | Updated: 2022-07-12
Poisoning
Malware Classification
Self-Supervised Learning

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13
Performance Evaluation
Privacy Assessment
Model Selection

A Vision Inspired Neural Network for Unsupervised Anomaly Detection in Unordered Data

Authors: Nassir Mohammad | Published: 2022-05-13
Robustness
Attack Detection
Self-Supervised Learning

Collaborative Drug Discovery: Inference-level Data Protection Perspective

Authors: Balazs Pejo, Mina Remeli, Adam Arany, Mathieu Galtier, Gergely Acs | Published: 2022-05-13 | Updated: 2022-06-09
Secure Aggregation
Privacy Assessment
Risk Analysis Method

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
Attack Methods against DFL
Query Generation Method
Attack Method

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method