Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13 WatermarkingEnergy ManagementAttack Evaluation 2023.06.08 2025.05.28 Literature Database
Extracting Cloud-based Model with Prior Knowledge Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13 Backdoor AttackAttack EvaluationAdversarial attack 2023.06.07 2025.05.28 Literature Database
Evading Black-box Classifiers Without Breaking Eggs Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14 Attack EvaluationAdversarial ExampleAdversarial attack 2023.06.05 2025.05.28 Literature Database
Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23 PoisoningAttack EvaluationRegularization 2023.06.02 2025.05.28 Literature Database
Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02 Attack EvaluationAdversarial attackWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06 Prompt InjectionExperimental ValidationAttack Evaluation 2023.04.10 2025.05.28 Literature Database
Does Prompt-Tuning Language Model Ensure Privacy? Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15 Privacy AnalysisPrivacy TechniqueAttack Evaluation 2023.04.07 2025.05.28 Literature Database
Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09 Performance EvaluationAttack EvaluationMachine Learning Method 2022.08.09 2025.05.28 Literature Database
On False Data Injection Attack against Building Automation Systems Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25 Attack EvaluationAttack Pattern ExtractionMachine Learning Method 2022.08.04 2025.05.28 Literature Database
Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23 Attack EvaluationMachine Learning ApplicationMachine Learning Technology 2021.07.05 2025.05.28 Literature Database