Threat Model

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07
Privacy Enhancing Technology
User Behavior Analysis
Threat Model

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
Risk Management
Attacker Behavior Analysis
Threat Model

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15
Adversarial Learning
Adversarial attack
Threat Model

Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness

Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09
Robustness Evaluation
Adversarial Example
Threat Model

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21
Event Trace Analysis
Membership Inference
Threat Model

Collaborative Information Sharing for ML-Based Threat Detection

Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23
Privacy Protection
Machine Learning Technology
Threat Model

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Authors: Vance Wong, John Emanuello | Published: 2021-04-21
ML-Based IDS
Feature Engineering
Threat Model

Towards Causal Federated Learning For Enhanced Robustness and Privacy

Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14
Privacy Protection
Poisoning
Threat Model

Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack

Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13
Poisoning Attack
Threat Model
Defense Mechanism

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05
Poisoning
Watermarking Settings for Medical Data
Threat Model