Attack Type

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27
Privacy-Preserving Data Mining
Attack Type
Vulnerability Analysis

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21
Poisoning
Model Performance Evaluation
Attack Type

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26
Risk Management
Information Security
Attack Type

Network Intrusion Detection based on LSTM and Feature Embedding

Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26
Attack Type
Machine Learning Application
Deep Learning-Based IDS

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06
Process Partitioning Method
Attack Type
Attack Detection

On Inferring Training Data Attributes in Machine Learning Models

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar | Published: 2019-08-28 | Updated: 2019-10-12
Membership Inference
Attribute Disclosure Risk
Attack Type

Detection of Backdoors in Trained Classifiers Without Access to the Training Set

Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19
Backdoor Attack
Attack Type
Adversarial Attack Detection

Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders

Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26
Attack Type
Vulnerability of Adversarial Examples
Machine Learning Method

Devil in the Detail: Attack Scenarios in Industrial Applications

Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24
Cybersecurity
Process Environment
Attack Type

Transferable Clean-Label Poisoning Attacks on Deep Neural Nets

Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16
Backdoor Attack
Poisoning
Attack Type