Literature Database

Local and Central Differential Privacy for Robustness and Privacy in Federated Learning

Authors: Mohammad Naseri, Jamie Hayes, Emiliano De Cristofaro | Published: 2020-09-08 | Updated: 2022-05-27
Backdoor Attack
Poisoning
Membership Disclosure Risk

Adversarial Attack on Large Scale Graph

Authors: Jintang Li, Tao Xie, Liang Chen, Fenfang Xie, Xiangnan He, Zibin Zheng | Published: 2020-09-08 | Updated: 2021-05-06
Graph Transformation
Adversarial Attack Methods
Structural Attack

Efficient Quantification of Profile Matching Risk in Social Networks

Authors: Anisa Halimi, Erman Ayday | Published: 2020-09-07
Attack that Analyzes Information Collected from Social Media to Identify Individuals using AI
Privacy Technique
Profile Matching

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing

Dynamically Computing Adversarial Perturbations for Recurrent Neural Networks

Authors: Shankar A. Deka, Dušan M. Stipanović, Claire J. Tomlin | Published: 2020-09-07
Multi-Class Classification
Adversarial Example
Adversarial Attack Methods

Detection Defense Against Adversarial Attacks with Saliency Map

Authors: Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang | Published: 2020-09-06
Poisoning
Adversarial Example
Adversarial Attack Methods

CLEANN: Accelerated Trojan Shield for Embedded Neural Networks

Authors: Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, Farinaz Koushanfar | Published: 2020-09-04
Trojan Detection
Membership Inference
Image Processing

Model extraction from counterfactual explanations

Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03
Model Extraction Attack
Causal Interpretation
Adversarial attack

Cost-aware Feature Selection for IoT Device Classification

Authors: Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy | Published: 2020-09-02 | Updated: 2021-04-21
Device Identification Method
Multi-Class Classification
Optimization Strategy

Yet Meta Learning Can Adapt Fast, It Can Also Break Easily

Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02
Meta-Learning Method
Adversarial Example
Adversarial attack