Attack Type

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29
Cyber Threat
Attack Type
Image Feature Extraction

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

Machine Learning Security against Data Poisoning: Are We There Yet?

Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08
Poisoning
Attack Type
Defense Method

Unsupervised Detection of Adversarial Examples with Model Explanations

Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22
Membership Inference
Attack Type
Adversarial Example

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19
Attack Type
Machine Learning Method
Vulnerability Management

Voting based ensemble improves robustness of defensive models

Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28
Model Performance Evaluation
Attack Type
Adversarial attack

Practical Privacy Attacks on Vertical Federated Learning

Authors: Haiqin Weng, Juntao Zhang, Xingjun Ma, Feng Xue, Tao Wei, Shouling Ji, Zhiyuan Zong | Published: 2020-11-18 | Updated: 2022-07-22
Data Privacy Assessment
Poisoning
Attack Type

Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs

Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier | Published: 2020-11-15 | Updated: 2021-04-18
Watermarking
Performance Evaluation
Attack Type

Is Private Learning Possible with Instance Encoding?

Authors: Nicholas Carlini, Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Shuang Song, Abhradeep Thakurta, Florian Tramer | Published: 2020-11-10 | Updated: 2021-04-28
Data Privacy Assessment
Membership Inference
Attack Type