Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel Authors: Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng | Published: 2021-09-15 GPU VulnerabilityMembership InferencePerformance Evaluation 2021.09.15 2025.05.28 Literature Database
Formalizing and Estimating Distribution Inference Risks Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05 Data LeakageMembership InferenceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
CrypTen: Secure Multi-Party Computation Meets Machine Learning Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15 Membership InferenceMachine Learning MethodComputational Efficiency 2021.09.02 2025.05.28 Literature Database
Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22 Proactive DefenseMembership InferenceDefense Mechanism 2021.07.22 2025.05.28 Literature Database
Unsupervised Detection of Adversarial Examples with Model Explanations Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22 Membership InferenceAttack TypeAdversarial Example 2021.07.22 2025.05.28 Literature Database
MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI Authors: Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara | Published: 2021-07-19 Membership InferenceModel InterpretabilityAttack Method 2021.07.19 2025.05.28 Literature Database
LAORAM: A Look Ahead ORAM Architecture for Training Large Embedding Tables Authors: Rachit Rajat, Yongqin Wang, Murali Annavaram | Published: 2021-07-16 | Updated: 2022-06-30 Privacy Protection MechanismMemory Management MethodMembership Inference 2021.07.16 2025.05.28 Literature Database
Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03 CybersecurityMembership InferenceThreat modeling 2021.07.05 2025.05.28 Literature Database
AI-enabled Automation for Completeness Checking of Privacy Policies Authors: Orlando Amaral, Sallam Abualhaija, Damiano Torre, Mehrdad Sabetzadeh, Lionel C. Briand | Published: 2021-06-10 | Updated: 2021-10-05 Privacy Enhancing TechnologyMembership InferenceLegal Compliance 2021.06.10 2025.05.28 Literature Database
Antipodes of Label Differential Privacy: PATE and ALIBI Authors: Mani Malek, Ilya Mironov, Karthik Prasad, Igor Shilov, Florian Tramèr | Published: 2021-06-07 | Updated: 2021-10-29 Privacy Protection MethodMembership InferenceLabel Uncertainty 2021.06.07 2025.05.28 Literature Database