Literature Database

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning

Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25
Poisoning
Adversarial Learning
Deep Learning

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24
Smart Healthcare
Privacy Protection Method
Encryption Technology

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23
Model Inversion
Adversarial Attack Methods
Face Recognition

Multiple Classification with Split Learning

Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11
Reconstruction Attack
Deep Learning
Deep Learning Method

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22
Data Generation
Information-Theoretic Evaluation
Machine Learning Algorithm

Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses

Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14
Game Theory
Attack Method
Adversarial Learning

Defending Distributed Classifiers Against Data Poisoning Attacks

Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21
Poisoning
Attack Method
Adversarial Learning

Defending Regression Learners Against Poisoning Attacks

Authors: Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz | Published: 2020-08-21
Backdoor Attack
Poisoning
Content Specialized for Toxicity Attacks

A(DP)$^2$SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent with Differential Privacy

Authors: Jie Xu, Wei Zhang, Fei Wang | Published: 2020-08-21
Membership Inference
Information-Theoretic Privacy
Federated Learning

PicoDomain: A Compact High-Fidelity Cybersecurity Dataset

Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang | Published: 2020-08-20
Data Generation
Information Leakage Analysis
Anomaly Detection Method