Defense Mechanism

Guarding Machine Learning Hardware Against Physical Side-Channel Attacks

Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01
Watermarking
Computational Efficiency
Defense Mechanism

Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs

Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04
Model Extraction Attack
Machine Learning Method
Defense Mechanism

HW2VEC: A Graph Learning Tool for Automating Hardware Security

Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26
Hardware Design
Machine Learning Application
Defense Mechanism

Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them

Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16
Role of Machine Learning
Defense Mechanism
High Difficulty Sample

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22
Proactive Defense
Membership Inference
Defense Mechanism

Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples

Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11
Adversarial Example
Optimization Strategy
Defense Mechanism

PopSkipJump: Decision-Based Attack for Probabilistic Classifiers

Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms
Defense Mechanism

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31
Risk Management
Vulnerability Assessment Method
Defense Mechanism

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22
UAP Training Method
Adversarial Attack Detection
Defense Mechanism

Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27
Poisoning
Adversarial attack
Defense Mechanism