Literature Database

A Comprehensive Benchmark Suite for Intel SGX

Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13
TEE Implementation
Data Generation
Performance Evaluation

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method

Sample Complexity Bounds for Robustly Learning Decision Lists against Evasion Attacks

Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2022-05-12
Robust Regression
Durability Issue
Function Definition

Secure Aggregation for Federated Learning in Flower

Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12
Training Protocol
Future Research
Communication Efficiency

Privacy-Preserving Distributed Machine Learning Made Faster

Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12
Privacy Technique
Evaluation Method
Function Definition

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06
Performance Evaluation
Methods for Dynamically Identifying New Classes
Machine Learning Method

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10
Performance Evaluation
Prompt Injection
Attack Detection

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09
Malware Classification
Attack Method
Durability Issue

Btech thesis report on adversarial attack detection and purification of adverserially attacked images

Authors: Dvij Kalaria | Published: 2022-05-09
Attack Detection
Adversarial Example
Adaptive Adversarial Training

On Generalisability of Machine Learning-based Network Intrusion Detection Systems

Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09
Performance Evaluation
Intrusion Detection System
Attack Detection