The Dark Side: Security Concerns in Machine Learning for EDA Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20 Training Data GenerationPrivacy Risk ManagementMalicious Client 2022.03.20 2025.05.28 Literature Database
EIFFeL: Ensuring Integrity for Federated Learning Authors: Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten | Published: 2021-12-23 | Updated: 2022-09-12 Data Integrity ConstraintsPrivacy ProtectionMalicious Client 2021.12.23 2025.05.28 Literature Database
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05 FPGA SecurityMalicious ClientComputational Efficiency 2020.09.29 2025.05.28 Literature Database
WAF-A-MoLE: Evading Web Application Firewalls through Adversarial Machine Learning Authors: Luca Demetrio, Andrea Valenza, Gabriele Costa, Giovanni Lagorio | Published: 2020-01-07 Robustness EvaluationMalicious ClientAdversarial Learning 2020.01.07 2025.05.28 Literature Database
Cronus: Robust and Heterogeneous Collaborative Learning with Black-Box Knowledge Transfer Authors: Hongyan Chang, Virat Shejwalkar, Reza Shokri, Amir Houmansadr | Published: 2019-12-24 Privacy Protection MethodRobustness EvaluationMalicious Client 2019.12.24 2025.05.28 Literature Database
Detecting Malignant TLS Servers Using Machine Learning Techniques Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25 Protocol ProcedureMalicious ClientFeature Selection 2017.05.25 2025.05.28 Literature Database