Evaluation Method

ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning

Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2024-05-31 | Updated: 2024-06-05
Poisoning
Evaluation Method
Defense Method

Revisit, Extend, and Enhance Hessian-Free Influence Functions

Authors: Ziao Yang, Han Yue, Jian Chen, Hongfu Liu | Published: 2024-05-25 | Updated: 2024-10-20
Poisoning
Model Performance Evaluation
Evaluation Method

Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models

Authors: Florent Guépin, Nataša Krčo, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2024-05-24
Membership Inference
Evaluation Method

Towards Certification of Uncertainty Calibration under Adversarial Attacks

Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22
Evaluation Method
Watermark Evaluation
Difficulty Calibration

Geometry-Aware Instrumental Variable Regression

Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19
Watermarking
Optimization Problem
Evaluation Method

A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks

Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15
Model Performance Evaluation
Anomaly Detection Method
Evaluation Method

Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing

Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18
Model Performance Evaluation
Evaluation Method
Watermark Evaluation

A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection

Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12
DDoS Attack Detection
Data Preprocessing
Evaluation Method

AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models

Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08
Cybersecurity
Threat modeling
Evaluation Method

Explainable Malware Detection with Tailored Logic Explained Networks

Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05
Malware Classification
Model Interpretability
Evaluation Method