Literature Database

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23
Poisoning
Optimization Methods
Vulnerability Assessment Method

Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs

Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26
Privacy Protection Method
Membership Inference
Natural Language Processing

Privacy Amplification Via Bernoulli Sampling

Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18
Privacy Protection Method
Information-Theoretic Evaluation
Optimization Methods

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20
Watermarking
Data Origins and Evolution
Poisoning

Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection

Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20
ML-Based IDS
Data Preprocessing
Data Collection

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20
Watermarking
Adversarial attack
Vulnerability Attack Method

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning

Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08
Privacy Protection Method
Computational Efficiency
Federated Learning

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta | Published: 2021-05-19
Online Malware Detection
Malware Propagation Means
Model Selection Method

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01
ML-Based IDS
Performance Evaluation
Deep Learning Technology

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25
Data Management System
Performance Evaluation
Memory Management Method