Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04 Model Extraction AttackMachine Learning MethodDefense Mechanism 2021.08.29 2025.05.28 Literature Database
Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Mitigating Statistical Bias within Differentially Private Synthetic Data Authors: Sahra Ghalebikesabi, Harrison Wilde, Jack Jewson, Arnaud Doucet, Sebastian Vollmer, Chris Holmes | Published: 2021-08-24 | Updated: 2022-05-19 Data GenerationPrivacy AssessmentMachine Learning Method 2021.08.24 2025.05.28 Literature Database
Revisiting IoT Device Identification Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16 User Behavior AnalysisMachine Learning MethodAdaptive Retraining Mechanism 2021.07.16 2025.05.28 Literature Database
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15 Byzantine ResilienceMachine Learning MethodFederated Learning 2021.07.12 2025.05.28 Literature Database
Segmented Federated Learning for Adaptive Intrusion Detection System Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02 CybersecurityMachine Learning MethodFederated Learning 2021.07.02 2025.05.28 Literature Database
Robust and Fully-Dynamic Coreset for Continuous-and-Bounded Learning (With Outliers) Problems Authors: Zixiu Wang, Yiwen Guo, Hu Ding | Published: 2021-06-30 | Updated: 2022-01-21 Core Set ConstructionRobustnessMachine Learning Method 2021.06.30 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 ML-Based IDSMachine Learning MethodAnomaly Detection Method 2021.03.31 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 ML-Based IDSModel SelectionMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 Data PreprocessingClassification of Malicious ActorsMachine Learning Method 2021.03.30 2025.05.28 Literature Database