Bayesian Framework for Gradient Leakage Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17 Backdoor AttackPoisoningDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14 Generalization PerformanceAdversarial Attack MethodsDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15 Membership InferenceAdversarial ExampleDefense Mechanism 2021.10.15 2025.05.28 Literature Database
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21 Backdoor AttackFederated LearningDefense Mechanism 2021.09.21 2025.05.28 Literature Database
Membership Inference Attacks Against Recommender Systems Authors: Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang | Published: 2021-09-16 Data GenerationMembership InferenceDefense Mechanism 2021.09.16 2025.05.28 Literature Database
Predicting Process Name from Network Data Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03 Cyber ThreatFundamentals of Machine LearningDefense Mechanism 2021.09.03 2025.05.28 Literature Database
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 WatermarkingComputational EfficiencyDefense Mechanism 2021.09.01 2025.05.28 Literature Database
Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04 Model Extraction AttackMachine Learning MethodDefense Mechanism 2021.08.29 2025.05.28 Literature Database
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 Hardware DesignMachine Learning ApplicationDefense Mechanism 2021.07.26 2025.05.28 Literature Database
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16 Role of Machine LearningDefense MechanismHigh Difficulty Sample 2021.07.24 2025.05.28 Literature Database