Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Network Cascade Vulnerability using Constrained Bayesian Optimization Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05 Cyber AttackHyperparameter TuningAttack Method 2023.04.27 2025.05.28 Literature Database
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24 Backdoor AttackPoisoningAttack Method 2023.01.06 2025.05.28 Literature Database
Multi-Player Bandits Robust to Adversarial Collisions Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15 Algorithm DesignAttack MethodOptimization Methods 2022.11.15 2025.05.28 Literature Database
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14 Backdoor AttackAttack MethodSelf-Supervised Learning 2022.10.13 2025.05.28 Literature Database
On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04 Clustering methodsPoisoningAttack Method 2022.10.04 2025.05.28 Literature Database
SNAP: Efficient Extraction of Private Properties with Poisoning Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21 Backdoor AttackProperty InferenceAttack Method 2022.08.25 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 CybersecurityAttack MethodMachine Learning Technology 2022.08.15 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 Robustness EvaluationPerformance Evaluation MetricsAttack Method 2022.08.12 2025.05.28 Literature Database