SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 Dataset evaluationMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Lessons Learned: Defending Against Property Inference Attacks Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09 Data PreprocessingMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 Performance EvaluationMembership InferenceAttack Method 2022.05.13 2025.05.28 Literature Database
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 Performance EvaluationMembership InferenceAttack Method 2022.05.12 2025.05.28 Literature Database
Towards Data-Free Model Stealing in a Hard Label Setting Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23 Attack Methods against DFLQuery DiversityMembership Inference 2022.04.23 2025.05.28 Literature Database
Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18 Backdoor AttackMembership InferenceDefense Method 2022.04.18 2025.05.28 Literature Database
Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06 Privacy AssessmentPoisoningMembership Inference 2022.03.31 2025.05.28 Literature Database
Attacker Attribution of Audio Deepfakes Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28 Clustering methodsMembership InferenceSpeech Synthesis Technology 2022.03.28 2025.05.28 Literature Database
One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13 Privacy Enhancing TechnologyMembership InferenceDefense Method 2022.03.13 2025.05.28 Literature Database
Defending against Reconstruction Attacks with Rényi Differential Privacy Authors: Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles | Published: 2022-02-15 Privacy Risk ManagementMembership InferenceMembership Disclosure Risk 2022.02.15 2025.05.28 Literature Database