TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 Attack DetectionAdversarial attackThreat Model 2021.03.10 2025.05.28 Literature Database
Secure Weighted Aggregation for Federated Learning Authors: Jiale Guo, Ziyao Liu, Kwok-Yan Lam, Jun Zhao, Yiqiang Chen, Chaoping Xing | Published: 2020-10-17 | Updated: 2021-05-11 Client Contribution AssessmentDistributed LearningThreat Model 2020.10.17 2025.05.28 Literature Database
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper) Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12 Information SecurityThreat Model 2020.10.12 2025.05.28 Literature Database
Clustering and Analysis of Vulnerabilities Present in Different Robot Types Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18 Clustering methodsSecurity AnalysisThreat Model 2020.08.18 2025.05.28 Literature Database
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25 Machine LearningMachine Learning TechnologyThreat Model 2020.05.25 2025.05.28 Literature Database
Can You Really Backdoor Federated Learning? Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02 Adversarial Attack MethodsThreat ModelEffectiveness Analysis of Defense Methods 2019.11.18 2025.05.28 Literature Database
TensorSCONE: A Secure TensorFlow Framework using Intel SGX Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12 Performance EvaluationThreat ModelWatermarking Technology 2019.02.12 2025.05.28 Literature Database
PRADA: Protecting against DNN Model Stealing Attacks Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31 Data GenerationModel Extraction AttackThreat Model 2018.05.07 2025.05.28 Literature Database