Approximate Data Deletion in Generative Models Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29 Algorithm DesignData LeakageHypothesis Testing 2022.06.29 2025.05.28 Literature Database
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 Data LeakageFingerprinting MethodPerformance Evaluation 2021.10.04 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
Formalizing and Estimating Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05 Data LeakageMembership InferenceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
Longitudinal Compliance Analysis of Android Applications with Privacy Policies Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28 Data CollectionData LeakagePrivacy Enhancing Technology 2021.06.18 2025.05.28 Literature Database
Information Theoretic Evaluation of Privacy-Leakage, Interpretability, and Transferability for Trustworthy AI Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer, Bernhard Freudenthaler | Published: 2021-06-06 | Updated: 2022-04-12 Data LeakagePrivacy Enhancing TechnologyInformation-Theoretic Evaluation 2021.06.06 2025.05.28 Literature Database
Machine Learning Interpretability Meets TLS Fingerprinting Authors: Mahdi Jafari Siavoshani, Amir Hossein Khajepour, Amirmohammad Ziaei, Amir Ali Gatmiri, Ali Taheri | Published: 2020-11-12 | Updated: 2021-09-12 Data LeakageModel Performance EvaluationDeep Learning-Based IDS 2020.11.12 2025.05.28 Literature Database
RAD: On-line Anomaly Detection for Highly Unreliable Data Authors: Zilong Zhao, Robert Birke, Rui Han, Bogdan Robu, Sara Bouchenak, Sonia Ben Mokhtar, Lydia Y. Chen | Published: 2019-11-11 Class ImbalanceData LeakageModel Performance Evaluation 2019.11.11 2025.05.28 Literature Database
Tackling Android Stego Apps in the Wild Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01 Data LeakageMachine Learning ApplicationImage Processing 2018.08.01 2025.05.28 Literature Database
Exploiting Unintended Feature Leakage in Collaborative Learning Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01 Data LeakageMembership InferenceLabel Inference Attack 2018.05.10 2025.05.28 Literature Database