Literature Database

Robust Classification Under $\ell_0$ Attack for the Gaussian Mixture Model

Authors: Payam Delgosha, Hamed Hassani, Ramtin Pedarsani | Published: 2021-04-05
Convergence Analysis
Adversarial Example
Optimization Problem

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05
Poisoning
Watermarking Settings for Medical Data
Threat Model

Monte Carlo execution time estimation for Privacy-preserving Distributed Function Evaluation protocols

Authors: Stefano M P C Souza, Daniel G Silva | Published: 2021-04-03
Simulation Environment
Privacy Protection
Statistical Hypothesis Testing

A Systematic Literature Review on Phishing and Anti-Phishing Techniques

Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02
Phishing Attack
Phishing Detection
Research Methodology

SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural Networks

Authors: Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong | Published: 2021-04-02 | Updated: 2022-05-16
Backdoor Attack Techniques
Poisoning Attack
Adversarial Example

Adversarial Attacks and Defenses for Speech Recognition Systems

Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31
Vulnerability of Adversarial Examples
Literature List
Defense Mechanism

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31
ML-Based IDS
Machine Learning Method
Anomaly Detection Method

Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support

Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31
Security label
Data Protection Method
Data Integrity Constraints

Statistical inference for individual fairness

Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30
Risk Assessment Method
Fairness evaluation
Optimization Methods

Exploring Edge TPU for Network Intrusion Detection in IoT

Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30
ML-Based IDS
Model Selection
Machine Learning Method