SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 Membership InferencePerformance EvaluationAttack Detection 2022.05.18 2025.05.28 Literature Database
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 Dataset evaluationMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Lessons Learned: Defending Against Property Inference Attacks Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09 Data PreprocessingMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 Performance EvaluationMembership InferenceAttack Method 2022.05.13 2025.05.28 Literature Database
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 Performance EvaluationMembership InferenceAttack Method 2022.05.12 2025.05.28 Literature Database
Towards Data-Free Model Stealing in a Hard Label Setting Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23 Attack Methods against DFLQuery DiversityMembership Inference 2022.04.23 2025.05.28 Literature Database
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18 Backdoor AttackMembership InferenceDefense Method 2022.04.18 2025.05.28 Literature Database
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06 Privacy AssessmentPoisoningMembership Inference 2022.03.31 2025.05.28 Literature Database
Attacker Attribution of Audio Deepfakes Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28 Clustering methodsMembership InferenceSpeech Synthesis Technology 2022.03.28 2025.05.28 Literature Database