SoK: Unintended Interactions among Machine Learning Defenses and Risks Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04 WatermarkingAdversarial ExampleOverfitting and Memorization 2023.12.07 2025.05.28 Literature Database
Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07 WatermarkingDefense Method 2023.12.07 2025.05.28 Literature Database
Understanding (Un)Intended Memorization in Text-to-Image Generative Models Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06 Evolution of AIWatermarkingCybersecurity 2023.12.06 2025.05.28 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 WatermarkingPrivacy ProtectionPrivacy Protection Method 2023.12.05 2025.05.28 Literature Database
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05 WatermarkingData GenerationIntrusion Detection System 2023.12.05 2025.05.28 Literature Database
Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Breaking XOR Arbiter PUFs without Reliability Information Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03 Evaluation Methods for PUFWatermarkingAttack Method 2023.12.03 2025.05.28 Literature Database
FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02 WatermarkingFraudulent TransactionWatermark Evaluation 2023.12.02 2025.05.28 Literature Database
Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 LSTM Model Performance EvaluationWatermarkingMalware Classification 2023.12.02 2025.05.28 Literature Database
Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05 WatermarkingMachine UnlearningWatermark Evaluation 2023.12.01 2025.05.28 Literature Database