Literature Database

Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27
Poisoning
Adversarial attack
Defense Mechanism

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks

Authors: Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu | Published: 2021-05-08
Poisoning
Content Specialized for Toxicity Attacks
Challenges of Generative Models

Blockchain Systems, Technologies and Applications: A Methodology Perspective

Authors: Bin Cao, Zixin Wang, Long Zhang, Daquan Feng, Mugen Peng, Lei Zhang | Published: 2021-05-08
Data Management System
Blockchain Strategy
Blockchain Interoperability

Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers

Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07
Code Change Analysis
Feature Selection Method
Vulnerability Analysis

Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Authors: Zeki Bilgin | Published: 2021-05-07
Code Change Analysis
Token Distribution Analysis
Vulnerability Analysis

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06
Class Imbalance
Data Preprocessing
Vulnerability Analysis

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05
Medical Image Analysis
Vulnerability of Adversarial Examples
Adversarial attack

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05
Data Management System
Privacy Protection
Optimization Methods

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04
Hardware Security
Vulnerability of Adversarial Examples
Vulnerability Analysis

A Review of Confidentiality Threats Against Embedded Neural Network Models

Authors: Raphaël Joud, Pierre-Alain Moellic, Rémi Bernhard, Jean-Baptiste Rigaud | Published: 2021-05-04
Active Learning
Data Privacy Assessment
Model Extraction Attack