Literature Database

Explaining Network Intrusion Detection System Using Explainable AI Framework

Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12
Cybersecurity
Model Architecture
Deep Learning Technology

On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson | Published: 2021-03-12
Membership Inference
Adversarial Attack Methods
Overfitting and Memorization

Adversarial attacks in consensus-based multi-agent reinforcement learning

Authors: Martin Figura, Krishna Chaitanya Kosaraju, Vijay Gupta | Published: 2021-03-11
Multi-Agent Reinforcement Learning
Convergence Analysis
Adversarial Attack Methods

Stochastic-HMDs: Adversarial Resilient Hardware Malware Detectors through Voltage Over-scaling

Authors: Md Shohidul Islam, Ihsen Alouani, Khaled N. Khasawneh | Published: 2021-03-11
Model Performance Evaluation
Reverse Engineering
Adversarial attack

BODAME: Bilevel Optimization for Defense Against Model Extraction

Authors: Yuto Mori, Atsushi Nitanda, Akiko Takeda | Published: 2021-03-11
Model Performance Evaluation
Adversarial attack
Selection and Evaluation of Optimization Algorithms

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17
Model Performance Evaluation
User Behavior Analysis
Deep Learning Method

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10
Attack Detection
Adversarial attack
Threat Model

Quantum machine learning with differential privacy

Authors: William M Watkins, Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2021-03-10
DP-SGD
Privacy Risk Management
Quantum Machine Learning

Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks

Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06
Model Performance Evaluation
Adversarial attack
Vulnerability Analysis

Proof-of-Learning: Definitions and Practice

Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09
Data Dependency
Model Performance Evaluation
Adversarial attack