M^4I: Multi-modal Models Membership Inference Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15 Privacy AnalysisModel DesignDeep Learning Method 2022.09.15 2025.05.28 Literature Database
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 Model DesignAdversarial Attack DetectionDeep Learning Method 2022.09.14 2025.05.28 Literature Database
SEEK: model extraction attack against hybrid secure inference protocols Authors: Si Chen, Junfeng Fan | Published: 2022-09-14 Model Extraction AttackModel DesignDeep Learning Method 2022.09.14 2025.05.28 Literature Database
A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 Model DesignAdversarial Attack DetectionOptimization Strategy 2022.09.13 2025.05.28 Literature Database
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 Model DesignIntrusion Detection SystemMachine Learning Method 2022.09.12 2025.05.28 Literature Database
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.12 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09 Privacy AnalysisModel DesignCommunication Model 2022.09.09 2025.05.28 Literature Database
On Specification-based Cyber-Attack Detection in Smart Grids Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09 Energy ManagementModel DesignIntrusion Detection System 2022.09.09 2025.05.28 Literature Database
Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20 DNN IP Protection MethodModel DesignMedical Monitoring System 2022.09.09 2025.05.28 Literature Database