Literature Database

SoK: Machine Learning Governance

Authors: Varun Chandrasekaran, Hengrui Jia, Anvith Thudi, Adelin Travers, Mohammad Yaghini, Nicolas Papernot | Published: 2021-09-20
Privacy Risk Management
Poisoning
Federated Learning

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

Towards Resilient Artificial Intelligence: Survey and Research Issues

Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18
Robustness
Future Research
Adversarial attack

A Fairness Analysis on Private Aggregation of Teacher Ensembles

Authors: Cuong Tran, My H. Dinh, Kyle Beiter, Ferdinando Fioretto | Published: 2021-09-17
Sample Complexity
Privacy Risk Management
Regularization

Membership Inference Attacks Against Recommender Systems

Authors: Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang | Published: 2021-09-16
Data Generation
Membership Inference
Defense Mechanism

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15
Performance Evaluation
Machine Learning Application
Anomaly Detection Method

Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel

Authors: Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng | Published: 2021-09-15
GPU Vulnerability
Membership Inference
Performance Evaluation

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06
Data Generation
Performance Evaluation
Adversarial attack

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Machine Learning Application

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Proactive Defense