Literature Database

On the Privacy Risks of Algorithmic Fairness

Authors: Hongyan Chang, Reza Shokri | Published: 2020-11-07 | Updated: 2021-04-07
Data Privacy Assessment
Membership Inference
Model Performance Evaluation

Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications

Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya | Published: 2020-11-03 | Updated: 2021-10-02
Blockchain Technology
Attack Type
Adversarial attack

Adversarial Examples in Constrained Domains

Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09
Adversarial Example
Adversarial attack
Feature Engineering

End-to-end anti-spoofing with RawNet2

Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16
Detection of Deepfakes
Model Evaluation
Speech Recognition Process

On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications

Authors: Chengshuai Shi, Cong Shen | Published: 2020-11-02 | Updated: 2021-04-24
Error Correction Code
Attack Type
Communication Efficiency

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31
DP-SGD
Machine Learning Technology
evaluation metrics

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30
Backdoor Attack
Malware Detection
Content Specialized for Toxicity Attacks

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Authors: Kunjal Panchal | Published: 2020-10-29
Password Guessing
Adversarial Learning
Generative Model Characteristics

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf | Published: 2020-10-29
TEE Implementation
Access Control
Memory Layout Design

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29
Adversarial Example
Certificate Ratio
Evaluation Method