A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20 Adversarial attackMachine Learning MethodDimensionality Reduction Method 2023.11.20 2025.05.28 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.28 Literature Database
Are Normalizing Flows the Key to Unlocking the Exponential Mechanism? Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11 Privacy ProtectionConvergence PropertyMachine Learning Method 2023.11.15 2025.05.28 Literature Database
B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23 Privacy TechniqueModel DesignMachine Learning Method 2023.10.23 2025.05.28 Literature Database
Fundamental Limits of Membership Inference Attacks on Machine Learning Models Authors: Eric Aubinais, Elisabeth Gassiat, Pablo Piantanida | Published: 2023-10-20 | Updated: 2025-05-12 Membership InferenceAdversarial attackMachine Learning Method 2023.10.20 2025.05.28 Literature Database
On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15 Adversarial attackOptimization MethodsMachine Learning Method 2023.10.19 2025.05.28 Literature Database
Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection Authors: Marc Schmitt | Published: 2023-10-15 CybersecurityNetwork Threat DetectionMachine Learning Method 2023.10.15 2025.05.27 Literature Database
Adversarial Attacks on Combinatorial Multi-Armed Bandits Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04 AlgorithmWatermarkingMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Transferable Availability Poisoning Attacks Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06 PoisoningSelection and Evaluation of Optimization AlgorithmsMachine Learning Method 2023.10.08 2025.05.28 Literature Database