Data Extraction and Analysis

When the Curious Abandon Honesty: Federated Learning Is Not Private

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12
Data Extraction and Analysis
Training Data Extraction Method
Poisoning

FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting

Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq | Published: 2021-12-03 | Updated: 2021-12-14
Data Extraction and Analysis
Fingerprinting Method
Privacy Risk Management

First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data

Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30
Data Extraction and Analysis
Data Generation
Performance Evaluation

An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data

Authors: Xinze Li, Baixi Zou | Published: 2021-09-28
Data Extraction and Analysis
Data-Driven Clustering
Anomaly Detection Method

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Machine Learning Application

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14
Cybersecurity
Data Extraction and Analysis
Proactive Defense

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13
Graph Neural Network
Data Extraction and Analysis
Data Generation

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12
Dataset Generation
Data Extraction and Analysis
Model Extraction Attack

Anomaly Detection using Principles of Human Perception

Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13
Data Extraction and Analysis
Anomaly Detection Algorithm
Statistical Methods

Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions

Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19
Data Extraction and Analysis
Poisoning
Adversarial Attack Methods