Literature Database

Headless Horseman: Adversarial Attacks on Transfer Learning Models

Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20
Poisoning
Adversarial Perturbation Techniques
Machine Learning

Local Differential Privacy based Federated Learning for Internet of Things

Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22
Privacy Enhancing Technology
Optimization Methods
Machine Learning

Data Poisoning Attacks on Federated Machine Learning

Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19
Poisoning
Attack Scenario Analysis
Machine Learning

Protecting Classifiers From Attacks. A Bayesian Approach

Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18
Multi-Class Classification
Adversarial Perturbation Techniques
Defense Method

On the (Un)Reliability of Privacy Policies in Android Apps

Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18
Privacy Technique
Dynamic Analysis Method
Machine Learning

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12
Clustering methods
Attack Pattern Extraction
evaluation metrics

Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems

Authors: Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Genshe Chen, Dan Shen | Published: 2020-04-16
Sensor State Estimation
Blockchain Technology
Multi-Domain Data Analysis

Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms

Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15
Multi-Class Classification
Machine Learning
Anomaly Detection Method

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15
Prompt Injection
Attack Type
Defense Method

Poisoning Attacks on Algorithmic Fairness

Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26
Algorithm Fairness
Poisoning
Optimization Methods