Membership Inference Attacks by Exploiting Loss Trajectory Authors: Yiyong Liu, Zhengyu Zhao, Michael Backes, Yang Zhang | Published: 2022-08-31 Membership InferenceModel ArchitectureAdversarial attack 2022.08.31 2025.05.28 Literature Database
Reducing Certified Regression to Certified Classification for General Poisoning Attacks Authors: Zayd Hammoudeh, Daniel Lowd | Published: 2022-08-29 | Updated: 2022-12-29 PoisoningModel ArchitectureRobust Regression 2022.08.29 2025.05.28 Literature Database
Security and Safety Aspects of AI in Industry Applications Authors: Hans Dermot Doran | Published: 2022-07-16 Security AnalysisTraining ProtocolModel Architecture 2022.07.16 2025.05.28 Literature Database
Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database
Dynamic Backdoors with Global Average Pooling Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04 Backdoor AttackModel Architecture 2022.03.04 2025.05.28 Literature Database
A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01 DoS MitigationDataset GenerationModel Architecture 2022.03.01 2025.05.28 Literature Database
Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01 Style Reconstruction PenaltyModel ArchitectureSelection and Evaluation of Optimization Algorithms 2022.03.01 2025.05.28 Literature Database
Sisyphus: A Cautionary Tale of Using Low-Degree Polynomial Activations in Privacy-Preserving Deep Learning Authors: Karthik Garimella, Nandan Kumar Jha, Brandon Reagen | Published: 2021-07-26 | Updated: 2021-11-02 Privacy TechniqueModel ArchitectureMachine Learning Application 2021.07.26 2025.05.28 Literature Database
The Influence of Dropout on Membership Inference in Differentially Private Models Authors: Erick Galinkin | Published: 2021-03-16 Data Management SystemModel ArchitectureQuantification of Uncertainty 2021.03.16 2025.05.28 Literature Database
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 CybersecurityModel ArchitectureDeep Learning Technology 2021.03.12 2025.05.28 Literature Database