Literature Database

Attacker Attribution of Audio Deepfakes

Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28
Clustering methods
Membership Inference
Speech Synthesis Technology

Distributed data analytics

Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26
Backdoor Attack
Privacy Protection
Communication Model

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25
Trojan Horse Signature
Knowledge Distillation
Defense Method

Email Summarization to Assist Users in Phishing Identification

Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24
Business Email Compromise
Email Security
Defense Method

MERLIN — Malware Evasion with Reinforcement LearnINg

Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30
Privacy Protection
Reinforcement Learning Algorithm
Defense Method

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki | Published: 2022-03-23
Smoothness Penalty
Physical attack
Face Recognition

Ethereum Fraud Detection with Heterogeneous Graph Neural Networks

Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04
Model Selection
Link Prediction Method
Structural Learning

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23
Dataset evaluation
Training Data Generation
Feature Extraction Method

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis

Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10
Attack Methods against DFL
Poisoning
Semi-Targeted Attack

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02
Dataset evaluation
Training Data Generation
Hyperparameter Optimization