Robustness of ML-Enhanced IDS to Stealthy Adversaries Authors: Vance Wong, John Emanuello | Published: 2021-04-21 ML-Based IDSFeature EngineeringThreat Model 2021.04.21 2025.05.28 Literature Database
Towards Causal Federated Learning For Enhanced Robustness and Privacy Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14 Privacy ProtectionPoisoningThreat Model 2021.04.14 2025.05.28 Literature Database
Fall of Giants: How popular text-based MLaaS fall against a simple evasion attack Authors: Luca Pajola, Mauro Conti | Published: 2021-04-13 Poisoning AttackThreat ModelDefense Mechanism 2021.04.13 2025.05.28 Literature Database
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05 PoisoningWatermarking Settings for Medical DataThreat Model 2021.04.05 2025.05.28 Literature Database
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack Authors: Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2021-03-10 Attack DetectionAdversarial attackThreat Model 2021.03.10 2025.05.28 Literature Database
Secure Weighted Aggregation for Federated Learning Authors: Jiale Guo, Ziyao Liu, Kwok-Yan Lam, Jun Zhao, Yiqiang Chen, Chaoping Xing | Published: 2020-10-17 | Updated: 2021-05-11 Client Contribution AssessmentDistributed LearningThreat Model 2020.10.17 2025.05.28 Literature Database
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper) Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12 Information SecurityThreat Model 2020.10.12 2025.05.28 Literature Database
Clustering and Analysis of Vulnerabilities Present in Different Robot Types Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18 Clustering methodsSecurity AnalysisThreat Model 2020.08.18 2025.05.28 Literature Database
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25 Machine LearningMachine Learning TechnologyThreat Model 2020.05.25 2025.05.28 Literature Database
Can You Really Backdoor Federated Learning? Authors: Ziteng Sun, Peter Kairouz, Ananda Theertha Suresh, H. Brendan McMahan | Published: 2019-11-18 | Updated: 2019-12-02 Adversarial Attack MethodsThreat ModelEffectiveness Analysis of Defense Methods 2019.11.18 2025.05.28 Literature Database