Membership Inference via Backdooring Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10 Attack Methods against DFLMembership InferenceAdversarial Attack Methods 2022.06.10 2025.05.28 Literature Database
Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2022-06-07 Attack Methods against DFLPrivacy AssessmentMembership Inference 2022.06.07 2025.05.28 Literature Database
Subject Membership Inference Attacks in Federated Learning Authors: Anshuman Suri, Pallika Kanani, Virendra J. Marathe, Daniel W. Peterson | Published: 2022-06-07 | Updated: 2023-06-02 Attack Methods against DFLMembership InferenceFederated Learning 2022.06.07 2025.05.28 Literature Database
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31 Membership InferenceTrust EvaluationCommunication Model 2022.05.31 2025.05.28 Literature Database
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 Membership InferencePerformance EvaluationAttack Detection 2022.05.18 2025.05.28 Literature Database
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 Dataset evaluationMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Lessons Learned: Defending Against Property Inference Attacks Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09 Data PreprocessingMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 Performance EvaluationMembership InferenceAttack Method 2022.05.13 2025.05.28 Literature Database
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 Performance EvaluationMembership InferenceAttack Method 2022.05.12 2025.05.28 Literature Database