Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16 PoisoningAttack MethodDefense Method 2024.05.16 2025.05.27 Literature Database
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09 Layout SecurityThreat modelingDefense Method 2024.05.09 2025.05.27 Literature Database
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 Privacy Protection MethodMembership InferenceDefense Method 2024.05.09 2025.05.27 Literature Database
Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06 Physical attackThreat modelingDefense Method 2024.05.06 2025.05.27 Literature Database
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24 PoisoningWatermark EvaluationDefense Method 2024.04.24 2025.05.27 Literature Database
Multimodal Attack Detection for Action Recognition Models Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13 DoS MitigationAdversarial TrainingDefense Method 2024.04.13 2025.05.27 Literature Database
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05 PoisoningFederated LearningDefense Method 2024.04.05 2025.05.27 Literature Database
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07 Attack MethodAdversarial ExampleDefense Method 2024.03.20 2025.05.27 Literature Database
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 Prompt InjectionStructural AttackDefense Method 2024.03.14 2025.05.27 Literature Database