Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13 Adversarial LearningDeep Reinforcement LearningDefense Effectiveness Analysis 2025.10.13 2025.10.15 Literature Database
Evaluating the Robustness of a Production Malware Detection System to Transferable Adversarial Attacks Authors: Milad Nasr, Yanick Fratantonio, Luca Invernizzi, Ange Albertini, Loua Farah, Alex Petit-Bianco, Andreas Terzis, Kurt Thomas, Elie Bursztein, Nicholas Carlini | Published: 2025-10-02 Online Malware DetectionAdversarial LearningStructural Attack 2025.10.02 2025.10.04 Literature Database
SPATA: Systematic Pattern Analysis for Detailed and Transparent Data Cards Authors: João Vitorino, Eva Maia, Isabel Praça, Carlos Soares | Published: 2025-09-30 Privacy-Preserving Machine LearningAdversarial LearningInterpretability 2025.09.30 2025.10.02 Literature Database
Federated Learning in the Wild: A Comparative Study for Cybersecurity under Non-IID and Unbalanced Settings Authors: Roberto Doriguzzi-Corin, Petr Sabel, Silvio Cretti, Silvio Ranise | Published: 2025-09-22 Client Selection MethodAdversarial LearningFederated Learning 2025.09.22 2025.09.24 Literature Database
Sy-FAR: Symmetry-based Fair Adversarial Robustness Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16 Ensuring FairnessAdversarial Learningevaluation metrics 2025.09.16 2025.09.18 Literature Database
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16 Secure AggregationDifferential PrivacyAdversarial Learning 2025.09.16 2025.09.18 Literature Database
Imitative Membership Inference Attack Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08 Experimental ValidationAttack MethodAdversarial Learning 2025.09.08 2025.09.10 Literature Database
Intellectual Property in Graph-Based Machine Learning as a Service: Attacks and Defenses Authors: Lincan Li, Bolin Shen, Chenxi Zhao, Yuxiang Sun, Kaixiang Zhao, Shirui Pan, Yushun Dong | Published: 2025-08-27 Model Extraction AttackAdversarial LearningIntellectual Property Protection 2025.08.27 2025.08.29 Literature Database
Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05 データセットの多様性Adversarial LearningDeep Learning Model 2025.08.05 2025.08.07 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 Reconstruction AttackAdversarial LearningWatermark Evaluation 2025.07.24 2025.07.26 Literature Database