Model Design

M^4I: Multi-modal Models Membership Inference

Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15
Privacy Analysis
Model Design
Deep Learning Method

Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries

Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14
Model Design
Adversarial Attack Detection
Deep Learning Method

SEEK: model extraction attack against hybrid secure inference protocols

Authors: Si Chen, Junfeng Fan | Published: 2022-09-14
Model Extraction Attack
Model Design
Deep Learning Method

A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game

Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13
Model Design
Adversarial Attack Detection
Optimization Strategy

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey

Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12
Model Design
Intrusion Detection System
Machine Learning Method

Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12
DNN IP Protection Method
Privacy Analysis
Model Design

Defend Data Poisoning Attacks on Voice Authentication

Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07
Model Design
Adversarial Attack Detection
Defense Mechanism

Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification

Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09
Privacy Analysis
Model Design
Communication Model

On Specification-based Cyber-Attack Detection in Smart Grids

Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09
Energy Management
Model Design
Intrusion Detection System

Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis

Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20
DNN IP Protection Method
Model Design
Medical Monitoring System