Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19 Training Data Extraction MethodReconstruction AttackDefense Mechanism 2021.11.19 2025.05.28 Literature Database
A Review of Adversarial Attack and Defense for Classification Methods Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18 Adversarial ExampleAdversarial attackDefense Mechanism 2021.11.18 2025.05.28 Literature Database
QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0 Authors: Kevin Wallis, Christoph Reich, Blesson Varghese, Christian Schindelhauer | Published: 2021-11-09 Data Integrity ConstraintsEfficiency of Distributed LearningDefense Mechanism 2021.11.09 2025.05.28 Literature Database
Bayesian Framework for Gradient Leakage Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17 Backdoor AttackPoisoningDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14 Generalization PerformanceAdversarial Attack MethodsDefense Mechanism 2021.11.08 2025.05.28 Literature Database
Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15 Membership InferenceAdversarial ExampleDefense Mechanism 2021.10.15 2025.05.28 Literature Database
DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21 Backdoor AttackFederated LearningDefense Mechanism 2021.09.21 2025.05.28 Literature Database
Membership Inference Attacks Against Recommender Systems Authors: Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang | Published: 2021-09-16 Data GenerationMembership InferenceDefense Mechanism 2021.09.16 2025.05.28 Literature Database
Predicting Process Name from Network Data Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03 Cyber ThreatFundamentals of Machine LearningDefense Mechanism 2021.09.03 2025.05.28 Literature Database