mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07 Privacy Enhancing TechnologyUser Behavior AnalysisThreat Model 2022.10.07 2025.05.28 Literature Database
Threat Assessment in Machine Learning based Systems Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30 Risk ManagementAttacker Behavior AnalysisThreat Model 2022.06.30 2025.05.28 Literature Database
Architectural Backdoors in Neural Networks Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15 Adversarial LearningAdversarial attackThreat Model 2022.06.15 2025.05.28 Literature Database
Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09 Robustness EvaluationAdversarial ExampleThreat Model 2022.05.20 2025.05.28 Literature Database
ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21 Event Trace AnalysisMembership InferenceThreat Model 2021.12.21 2025.05.28 Literature Database
Collaborative Information Sharing for ML-Based Threat Detection Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23 Privacy ProtectionMachine Learning TechnologyThreat Model 2021.04.23 2025.05.28 Literature Database
Robustness of ML-Enhanced IDS to Stealthy Adversaries Authors: Vance Wong, John Emanuello | Published: 2021-04-21 ML-Based IDSFeature EngineeringThreat Model 2021.04.21 2025.05.28 Literature Database
Towards Causal Federated Learning For Enhanced Robustness and Privacy Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14 Privacy ProtectionPoisoningThreat Model 2021.04.14 2025.05.28 Literature Database
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13 Poisoning AttackThreat ModelDefense Mechanism 2021.04.13 2025.05.28 Literature Database
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05 PoisoningWatermarking Settings for Medical DataThreat Model 2021.04.05 2025.05.28 Literature Database