Literature Database

CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi | Published: 2021-10-21
Reverse Engineering
Adversarial Training
Machine Learning Method

Privacy in Open Search: A Review of Challenges and Solutions

Authors: Samuel Sousa, Christian Guetl, Roman Kern | Published: 2021-10-20 | Updated: 2022-04-04
Privacy Protection
Review and Investigation
Information Retrieval

Color Teams for Machine Learning Development

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20
Automation of Cybersecurity
Data Collection
Machine Learning Framework

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems

Authors: Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu | Published: 2021-10-20
Sensor State Estimation
Adversarial Attack Detection
Automotive Network Security

Multi-concept adversarial attacks

Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham | Published: 2021-10-19
Membership Inference
Robustness Evaluation
Adversarial Attack Methods

A ground-truth dataset of real security patches

Authors: Sofia Reis, Rui Abreu | Published: 2021-10-18
Data Generation
Data Management System
Automated Vulnerability Remediation

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17
Adversarial Attack Methods
Machine Learning Algorithm

Adversarial Attacks on Gaussian Process Bandits

Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16
Algorithm Design
Trade-off Analysis
Adversarial Attack Methods

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture

Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15
Membership Inference
Adversarial Example
Defense Mechanism

Adversarial Attacks on ML Defense Models Competition

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen | Published: 2021-10-15
Robustness Evaluation
Adversarial Example
Adversarial Attack Methods