Threat Model

TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack

Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10
Attack Detection
Adversarial attack
Threat Model

Secure Weighted Aggregation for Federated Learning

Authors: Jiale Guo, Ziyao Liu, Kwok-Yan Lam, Jun Zhao, Yiqiang Chen, Chaoping Xing | Published: 2020-10-17 | Updated: 2021-05-11
Client Contribution Assessment
Distributed Learning
Threat Model

Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12
Information Security
Threat Model

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18
Clustering methods
Security Analysis
Threat Model

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Threat Model

Can You Really Backdoor Federated Learning?

Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02
Adversarial Attack Methods
Threat Model
Effectiveness Analysis of Defense Methods

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
Performance Evaluation
Threat Model
Watermarking Technology

PRADA: Protecting against DNN Model Stealing Attacks

Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31
Data Generation
Model Extraction Attack
Threat Model