SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31 WatermarkingMembership InferenceDefense Method 2022.01.27 2025.05.28 Literature Database
Challenges and Approaches for Mitigating Byzantine Attacks in Federated Learning Authors: Junyu Shi, Wei Wan, Shengshan Hu, Jianrong Lu, Leo Yu Zhang | Published: 2021-12-29 | Updated: 2022-10-07 Backdoor AttackPoisoningDefense Method 2021.12.29 2025.05.28 Literature Database
SoK: A Study of the Security on Voice Processing Systems Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24 Privacy Risk ManagementAdversarial Attack MethodsDefense Method 2021.12.24 2025.05.28 Literature Database
Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22 PoisoningAdversarial LearningDefense Method 2021.12.22 2025.05.28 Literature Database
A Theoretical View of Linear Backpropagation and Its Convergence Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10 Model DesignConvergence AnalysisDefense Method 2021.12.21 2025.05.28 Literature Database
Robustifying automatic speech recognition by extracting slowly varying features Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06 PoisoningAdversarial TrainingDefense Method 2021.12.14 2025.05.28 Literature Database
On the Security & Privacy in Federated Learning Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16 Backdoor AttackPoisoningDefense Method 2021.12.10 2025.05.28 Literature Database
Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Gradient-Free Adversarial Attacks for Bayesian Neural Networks Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23 Attack EvaluationAdversarial ExampleDefense Method 2020.12.23 2025.05.28 Literature Database