Literature Database

Don’t Generate Me: Training Differentially Private Generative Models with Sinkhorn Divergence

Authors: Tianshi Cao, Alex Bie, Arash Vahdat, Sanja Fidler, Karsten Kreis | Published: 2021-11-01 | Updated: 2021-11-29
Data Generation
Trade-off Analysis
Privacy Risk Management

Availability Attacks Create Shortcuts

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02
DDoS Attack
Data Generation
Adversarial Attack Detection

FuCE: Fuzzing+Concolic Execution guided Trojan Detection in Synthesizable Hardware Designs

Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay | Published: 2021-11-01
Security Testing
Trojan Detection
Threat modeling

Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform

Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31
IoT Security
Application of XAI
Transparency and Verification

Efficient passive membership inference attack in federated learning

Authors: Oualid Zari, Chuan Xu, Giovanni Neglia | Published: 2021-10-31
Poisoning
Membership Inference
Low-Cost Membership Inference Method

Autoencoder-based Anomaly Detection in Smart Farming Ecosystem

Authors: Mary Adkisson, Jeffrey C Kimmel, Maanak Gupta, Mahmoud Abdelsalam | Published: 2021-10-29
Vulnerabilities of IoT Devices
Data Management System
Machine Learning Application

Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem

Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29
Machine Learning Application
Machine Learning Method
Feature Engineering

A Comprehensive Study on Learning-Based PE Malware Family Classification Methods

Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29
PE Malware Classification
Poisoning
Evaluation Method

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti | Published: 2021-10-28
Fingerprinting Method
Hypothesis Testing
Wireless Channel Detection

Federated Learning with Heterogeneous Differential Privacy

Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami | Published: 2021-10-28 | Updated: 2023-01-14
Privacy Protection Mechanism
Distributed Learning
Performance Evaluation Metrics