Literature Database

Achieving Security and Privacy in Federated Learning Systems: Survey, Research Challenges and Future Directions

Authors: Alberto Blanco-Justicia, Josep Domingo-Ferrer, Sergio Martínez, David Sánchez, Adrian Flanagan, Kuan Eeik Tan | Published: 2020-12-12
Attack Methods against DFL
Poisoning
Federated Learning

Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning

Authors: Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang | Published: 2020-12-12
DDoS Attack
Online Learning
Attack Detection

On Lightweight Privacy-Preserving Collaborative Learning for Internet of Things by Independent Random Projections

Authors: Linshan Jiang, Rui Tan, Xin Lou, Guosheng Lin | Published: 2020-12-11
Data Privacy Assessment
Data Protection Method
Federated Learning

I-GCN: Robust Graph Convolutional Network via Influence Mechanism

Authors: Haoxi Zhan, Xiaobing Pei | Published: 2020-12-11
Poisoning
Role of Machine Learning
Knowledge Graph

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10
Dataset evaluation
Taxonomy of Attacks
Role of Machine Learning

Privacy-preserving medical image analysis

Authors: Alexander Ziller, Jonathan Passerat-Palmbach, Théo Ryffel, Dmitrii Usynin, Andrew Trask, Ionésio Da Lima Costa Junior, Jason Mancuso, Marcus Makowski, Daniel Rueckert, Rickmer Braren, Georgios Kaissis | Published: 2020-12-10
Data Protection Method
Watermarking Settings for Medical Data
Federated Learning

Composite Adversarial Attacks

Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10
Taxonomy of Attacks
Adversarial Attack Methods
Defense Mechanism

Research Challenges in Designing Differentially Private Text Generation Mechanisms

Authors: Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier | Published: 2020-12-10
Data Privacy Assessment
Data Protection Method
Statistical Methods

Risk Management Framework for Machine Learning Security

Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09
Cost Efficiency
Data Protection Method
Evaluation Method

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method