Literature Database

Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

Authors: Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Rainer Leupers | Published: 2021-07-19
Cost Model
Logic Locking
Attack Method

Trends in Blockchain and Federated Learning for Data Sharing in Distributed Platforms

Authors: Haemin Lee, Joongheon Kim | Published: 2021-07-19
Privacy Enhancing Technology
Blockchain
Federated Learning

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04
Data-Driven Vulnerability Assessment
Multi-Class Classification
Vulnerability Assessment Method

LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables

Authors: Rachit Rajat, Yongqin Wang, Murali Annavaram | Published: 2021-07-16 | Updated: 2022-06-30
Privacy Protection Mechanism
Memory Management Method
Membership Inference

Revisiting IoT Device Identification

Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16
User Behavior Analysis
Machine Learning Method
Adaptive Retraining Mechanism

Towards Quantifying the Carbon Emissions of Differentially Private Machine Learning

Authors: Rakshit Naidu, Harshita Diddee, Ajinkya Mulay, Aleti Vardhan, Krithika Ramesh, Ahmed Zamzam | Published: 2021-07-14
Privacy Protection Mechanism
Role of Machine Learning
Complexity of the Environment

On the impossibility of non-trivial accuracy under fairness constraints

Authors: Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia | Published: 2021-07-14 | Updated: 2021-11-23
Data Privacy Assessment
Model Design and Accuracy
evaluation metrics

Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests

Authors: Sean Kulinski, Saurabh Bagchi, David I. Inouye | Published: 2021-07-14
Data Contamination Detection
Concept Drift
Statistical Testing

OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning

Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15
Byzantine Resilience
Machine Learning Method
Federated Learning

Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed | Published: 2021-07-12
ML-Based IDS
Model Design and Accuracy
Automotive Network Security