Literature Database

Bayesian Framework for Gradient Leakage

Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17
Backdoor Attack
Poisoning
Defense Mechanism

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08
PDF Malware Analysis
Dataset Generation
Machine Learning Algorithm

Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks

Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14
Generalization Performance
Adversarial Attack Methods
Defense Mechanism

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08
Dataset evaluation
Backdoor Attack
Adversarial Attack Methods

Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning

Authors: Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, Jie Tang | Published: 2021-11-08
Dataset evaluation
Poisoning
Generalization Performance

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten | Published: 2021-11-06
ICS Honeypot Development
Algorithm
Adaptive Adversarial Training

Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution

Authors: Yiftach Savransky, Roni Mateless, Gilad Katz | Published: 2021-11-04
Data Generation
Privacy Protection
Reconstruction Durability

Adversarial Attacks on Graph Classification via Bayesian Optimisation

Authors: Xingchen Wan, Henry Kenlay, Binxin Ru, Arno Blaas, Michael A. Osborne, Xiaowen Dong | Published: 2021-11-04
Explainability of Graph Machine Learning
Poisoning
Adversarial Attack Methods

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann | Published: 2021-11-04
Dataset evaluation
Privacy Protection
Federated Learning

A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks

Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02
Dataset evaluation
Machine Learning Algorithm
Automated Intrusion Detection System