When the Curious Abandon Honesty: Federated Learning Is Not Private Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12 Data Extraction and AnalysisTraining Data Extraction MethodPoisoning 2021.12.06 2025.05.28 Literature Database
FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq | Published: 2021-12-03 | Updated: 2021-12-14 Data Extraction and AnalysisFingerprinting MethodPrivacy Risk Management 2021.12.03 2025.05.28 Literature Database
First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data Authors: Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima | Published: 2021-09-30 Data Extraction and AnalysisData GenerationPerformance Evaluation 2021.09.30 2025.05.28 Literature Database
An Automated Data Engineering Pipeline for Anomaly Detection of IoT Sensor Data Authors: Xinze Li, Baixi Zou | Published: 2021-09-28 Data Extraction and AnalysisData-Driven ClusteringAnomaly Detection Method 2021.09.28 2025.05.28 Literature Database
A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14 CybersecurityData Extraction and AnalysisMachine Learning Application 2021.09.14 2025.05.28 Literature Database
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14 CybersecurityData Extraction and AnalysisProactive Defense 2021.09.14 2025.05.28 Literature Database
Deep Generative Models to Extend Active Directory Graphs with Honeypot Users Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13 Graph Neural NetworkData Extraction and AnalysisData Generation 2021.09.13 2025.05.28 Literature Database
Stateful Detection of Model Extraction Attacks Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12 Dataset GenerationData Extraction and AnalysisModel Extraction Attack 2021.07.12 2025.05.28 Literature Database
Anomaly Detection using Principles of Human Perception Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13 Data Extraction and AnalysisAnomaly Detection AlgorithmStatistical Methods 2021.03.23 2025.05.28 Literature Database
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19 Data Extraction and AnalysisPoisoningAdversarial Attack Methods 2021.03.19 2025.05.28 Literature Database