PassGAN: A Deep Learning Approach for Password Guessing Authors: Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz | Published: 2017-09-01 | Updated: 2019-02-14 Password Strength EvaluationModel Performance EvaluationChallenges of Generative Models 2017.09.01 2025.05.28 Literature Database
RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16 Detection of Poison Data for Backdoor AttacksPrivacy Protection MethodGenerative Model 2017.08.31 2025.05.28 Literature Database
On Security and Sparsity of Linear Classifiers for Adversarial Settings Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31 Membership InferenceRobustness AnalysisAttack Method 2017.08.31 2025.05.28 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.28 Literature Database
Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30 Sensor Information ManagementPrivacy Protection MethodUser Behavior Analysis 2017.08.30 2025.05.28 Literature Database
POISED: Spotting Twitter Spam Off the Beaten Paths Authors: Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, Jose Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna | Published: 2017-08-29 Community DetectionSpam Classification ModelPrompt Injection 2017.08.29 2025.05.28 Literature Database
Practical Attacks Against Graph-based Clustering Authors: Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou | Published: 2017-08-29 Community DetectionPoisoningAttack Method 2017.08.29 2025.05.28 Literature Database
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization Authors: Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli | Published: 2017-08-29 PoisoningOptimization MethodsDeep Learning Model 2017.08.29 2025.05.28 Literature Database
Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features Authors: Liang Tong, Bo Li, Chen Hajaj, Chaowei Xiao, Ning Zhang, Yevgeniy Vorobeychik | Published: 2017-08-28 | Updated: 2019-05-10 Model Extraction AttackRobustness AnalysisAdversarial Learning 2017.08.28 2025.05.28 Literature Database
On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches Authors: Martín Abadi, Úlfar Erlingsson, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Nicolas Papernot, Kunal Talwar, Li Zhang | Published: 2017-08-26 Data Privacy ManagementPrivacy-Preserving Machine LearningDifferential Privacy 2017.08.26 2025.05.28 Literature Database