Literature Database

PassFlow: Guessing Passwords with Generative Flows

Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini | Published: 2021-05-13 | Updated: 2021-12-14
Password Guessing
Performance Evaluation
Generative Model

The FeatureCloud AI Store for Federated Learning in Biomedicine and Beyond

Authors: Julian Matschinske, Julian Späth, Reza Nasirigerdeh, Reihaneh Torkzadehmahani, Anne Hartebrodt, Balázs Orbán, Sándor Fejér, Olga Zolotareva, Mohammad Bakhtiari, Béla Bihari, Marcus Bloice, Nina C Donner, Walid Fdhila, Tobias Frisch, Anne-Christin Hauschild, Dominik Heider, Andreas Holzinger, Walter Hötzendorfer, Jan Hospes, Tim Kacprowski, Markus Kastelitz, Markus List, Rudolf Mayer, Mónika Moga, Heimo Müller, Anastasia Pustozerova, Richard Röttger, Anna Saranti, Harald HHW Schmidt, Christof Tschohl, Nina K Wenke, Jan Baumbach | Published: 2021-05-12
Data Management System
Privacy Enhancing Protocol
Federated Learning

An Efficient Learning Framework For Federated XGBoost Using Secret Sharing And Distributed Optimization

Authors: Lunchen Xie, Jiaqi Liu, Songtao Lu, Tsung-hui Chang, Qingjiang Shi | Published: 2021-05-12
Distributed Learning
Computational Efficiency
Federated Learning

ADASYN-Random Forest Based Intrusion Detection Model

Authors: Zhewei Chen, Wenwen Yu, Linyue Zhou | Published: 2021-05-10 | Updated: 2022-04-14
ML-Based IDS
Class Imbalance
Data Preprocessing

Advanced Metering Infrastructures: Security Risks and Mitigation

Authors: Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles | Published: 2021-05-10
ML-Based IDS
Cyber Attack
Vulnerability Management

SIRNN: A Math Library for Secure RNN Inference

Authors: Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi | Published: 2021-05-10
Library Classification
Deep Learning Method
Computational Efficiency

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal | Published: 2021-05-09 | Updated: 2021-07-23
Adversarial Attack Methods
Optimization Problem
Deep Learning Method

Bounding Information Leakage in Machine Learning

Authors: Ganesh Del Grosso, Georg Pichler, Catuscia Palamidessi, Pablo Piantanida | Published: 2021-05-09 | Updated: 2023-03-07
Bayesian Adversarial Learning
Membership Inference

Learning Image Attacks toward Vision Guided Autonomous Vehicles

Authors: Hyung-Jin Yoon, Hamidreza Jafarnejadsani, Petros Voulgaris | Published: 2021-05-09 | Updated: 2021-05-17
Adversarial Attack Methods
State Estimation Method
Generative Adversarial Network

Mental Models of Adversarial Machine Learning

Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz | Published: 2021-05-08 | Updated: 2022-06-29
Poisoning
Mental Model
Adversarial Example