Model Design

MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective

Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23
Model Extraction Attack
Model Design
Risk Assessment

DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning

Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18
Model Design
Machine Learning Framework
Evaluation Method

SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes

Authors: Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro | Published: 2025-05-28
Data Origins and Evolution
Model Design
Dynamic Analysis Method

FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning

Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08
Privacy Design Principles
Model Design
Machine Learning Technology

Layered Uploading for Quantum Convolutional Neural Networks

Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13
Model Design
Loss Function
Machine Learning Technology

Contextual Chart Generation for Cyber Deception

Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07
Data Preprocessing
Model Design
Evaluation Method

Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29
Model Design
Robustness Evaluation
Adversarial Learning

Federated Bayesian Network Ensembles

Authors: Florian van Daalen, Lianne Ippel, Andre Dekker, Inigo Bermejo | Published: 2024-02-19
Bayesian Classification
Model Design
Federated Learning

Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter | Published: 2024-02-02
Watermarking
Model Design

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
Security Analysis
Model Design
Adversarial Attack Detection