Adversarial attacks and defenses in explainable artificial intelligence: A survey Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13 Membership InferenceAttack MethodAdversarial Example 2023.06.06 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 Privacy Protection MethodMembership InferenceWatermark Evaluation 2023.05.31 2025.05.28 Literature Database
Blockchain Large Language Models Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais | Published: 2023-04-25 | Updated: 2023-04-29 Membership InferenceIntrusion Detection SystemAnomaly Detection Method 2023.04.25 2025.05.28 Literature Database
Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks Authors: Isabell Lederer, Rudolf Mayer, Andreas Rauber | Published: 2023-04-22 DNN IP Protection MethodWatermarkingMembership Inference 2023.04.22 2025.05.28 Literature Database
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03 CybersecurityMembership InferenceMachine Learning Technology 2023.03.20 2025.05.28 Literature Database
Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19 Hyperparameter TuningPoisoning AttackMembership Inference 2023.02.09 2025.05.28 Literature Database
Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.28 Literature Database
Introducing Model Inversion Attacks on Automatic Speaker Recognition Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09 Privacy Enhancing TechnologyMembership InferenceSpeech Synthesis Technology 2023.01.09 2025.05.28 Literature Database
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin | Published: 2022-12-21 | Updated: 2023-04-20 Data Privacy AssessmentPrivacy Enhancing TechnologyMembership Inference 2022.12.21 2025.05.28 Literature Database
Dissecting Distribution Inference Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans | Published: 2022-12-15 | Updated: 2024-04-05 Privacy Risk ManagementPrivacy Protection MethodMembership Inference 2022.12.15 2025.05.28 Literature Database