Survey of Attacks and Defenses on Edge-Deployed Neural Networks Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27 Privacy-Preserving Data MiningAttack TypeVulnerability Analysis 2019.11.27 2025.05.28 Literature Database
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21 PoisoningModel Performance EvaluationAttack Type 2019.11.26 2025.05.28 Literature Database
Assessing Supply Chain Cyber Risks Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26 Risk ManagementInformation SecurityAttack Type 2019.11.26 2025.05.28 Literature Database
Network Intrusion Detection based on LSTM and Feature Embedding Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26 Attack TypeMachine Learning ApplicationDeep Learning-Based IDS 2019.11.26 2025.05.28 Literature Database
The Naked Sun: Malicious Cooperation Between Benign-Looking Processes Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06 Process Partitioning MethodAttack TypeAttack Detection 2019.11.06 2025.05.28 Literature Database
On Inferring Training Data Attributes in Machine Learning Models Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar | Published: 2019-08-28 | Updated: 2019-10-12 Membership InferenceAttribute Disclosure RiskAttack Type 2019.08.28 2025.05.28 Literature Database
Detection of Backdoors in Trained Classifiers Without Access to the Training Set Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19 Backdoor AttackAttack TypeAdversarial Attack Detection 2019.08.27 2025.05.28 Literature Database
Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26 Attack TypeVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.26 2025.05.28 Literature Database
Devil in the Detail: Attack Scenarios in Industrial Applications Authors: Simon D. Duque Anton, Alexander Hafner, Hans Dieter Schotten | Published: 2019-05-24 CybersecurityProcess EnvironmentAttack Type 2019.05.24 2025.05.28 Literature Database
Transferable Clean-Label Poisoning Attacks on Deep Neural Nets Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16 Backdoor AttackPoisoningAttack Type 2019.05.15 2025.05.28 Literature Database