Data Leakage

Approximate Data Deletion in Generative Models

Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29
Algorithm Design
Data Leakage
Hypothesis Testing

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Authors: Han Wang | Published: 2021-10-04
Data Leakage
Fingerprinting Method
Performance Evaluation

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

Formalizing and Estimating Distribution Inference Risks

Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05
Data Leakage
Membership Inference
Adversarial Learning

Longitudinal Compliance Analysis of Android Applications with Privacy Policies

Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28
Data Collection
Data Leakage
Privacy Enhancing Technology

Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI

Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer, Bernhard Freudenthaler | Published: 2021-06-06 | Updated: 2022-04-12
Data Leakage
Privacy Enhancing Technology
Information-Theoretic Evaluation

Machine Learning Interpretability Meets TLS Fingerprinting

Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12
Data Leakage
Model Performance Evaluation
Deep Learning-Based IDS

RAD: On-line Anomaly Detection for Highly Unreliable Data

Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11
Class Imbalance
Data Leakage
Model Performance Evaluation

Tackling Android Stego Apps in the Wild

Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01
Data Leakage
Machine Learning Application
Image Processing

Exploiting Unintended Feature Leakage in Collaborative Learning

Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01
Data Leakage
Membership Inference
Label Inference Attack