Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 WatermarkingComputational EfficiencyDefense Mechanism 2021.09.01 2025.05.28 Literature Database
Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04 Model Extraction AttackMachine Learning MethodDefense Mechanism 2021.08.29 2025.05.28 Literature Database
HW2VEC: A Graph Learning Tool for Automating Hardware Security Authors: Shih-Yuan Yu, Rozhin Yasaei, Qingrong Zhou, Tommy Nguyen, Mohammad Abdullah Al Faruque | Published: 2021-07-26 Hardware DesignMachine Learning ApplicationDefense Mechanism 2021.07.26 2025.05.28 Literature Database
Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16 Role of Machine LearningDefense MechanismHigh Difficulty Sample 2021.07.24 2025.05.28 Literature Database
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22 Proactive DefenseMembership InferenceDefense Mechanism 2021.07.22 2025.05.28 Literature Database
Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples Authors: Maura Pintor, Luca Demetrio, Angelo Sotgiu, Ambra Demontis, Nicholas Carlini, Battista Biggio, Fabio Roli | Published: 2021-06-18 | Updated: 2022-10-11 Adversarial ExampleOptimization StrategyDefense Mechanism 2021.06.18 2025.05.28 Literature Database
PopSkipJump: Decision-Based Attack for Probabilistic Classifiers Authors: Carl-Johann Simon-Gabriel, Noman Ahmed Sheikh, Andreas Krause | Published: 2021-06-14 Adversarial Attack MethodsSelection and Evaluation of Optimization AlgorithmsDefense Mechanism 2021.06.14 2025.05.28 Literature Database
GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31 Risk ManagementVulnerability Assessment MethodDefense Mechanism 2021.05.31 2025.05.28 Literature Database
Real-time Detection of Practical Universal Adversarial Perturbations Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22 UAP Training MethodAdversarial Attack DetectionDefense Mechanism 2021.05.16 2025.05.28 Literature Database
Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27 PoisoningAdversarial attackDefense Mechanism 2021.05.08 2025.05.28 Literature Database