Attack Evaluation

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13
Watermarking
Energy Management
Attack Evaluation

Extracting Cloud-based Model with Prior Knowledge

Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13
Backdoor Attack
Attack Evaluation
Adversarial attack

Evading Black-box Classifiers Without Breaking Eggs

Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14
Attack Evaluation
Adversarial Example
Adversarial attack

Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23
Poisoning
Attack Evaluation
Regularization

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
Attack Evaluation
Adversarial attack
Watermark Evaluation

Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence

Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06
Prompt Injection
Experimental Validation
Attack Evaluation

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15
Privacy Analysis
Privacy Technique
Attack Evaluation

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
Performance Evaluation
Attack Evaluation
Machine Learning Method

On False Data Injection Attack against Building Automation Systems

Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25
Attack Evaluation
Attack Pattern Extraction
Machine Learning Method

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23
Attack Evaluation
Machine Learning Application
Machine Learning Technology