Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14 APT Defense TechniquesAttack MethodMalware Detection with Limited Samples 2023.06.13 2025.05.28 Literature Database
Zero-Day Threats Detection for Critical Infrastructures Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10 Random ForestAttack MethodStatistical Methods 2023.06.10 2025.05.28 Literature Database
Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09 Attack MethodAdversarial TrainingBehavior Analysis Method 2023.06.09 2025.05.28 Literature Database
Adversarial attacks and defenses in explainable artificial intelligence: A survey Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13 Membership InferenceAttack MethodAdversarial Example 2023.06.06 2025.05.28 Literature Database
Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Network Cascade Vulnerability using Constrained Bayesian Optimization Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05 Cyber AttackHyperparameter TuningAttack Method 2023.04.27 2025.05.28 Literature Database
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24 Backdoor AttackPoisoningAttack Method 2023.01.06 2025.05.28 Literature Database
Multi-Player Bandits Robust to Adversarial Collisions Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15 Algorithm DesignAttack MethodOptimization Methods 2022.11.15 2025.05.28 Literature Database
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14 Backdoor AttackAttack MethodSelf-Supervised Learning 2022.10.13 2025.05.28 Literature Database