On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04 Clustering methodsPoisoningAttack Method 2022.10.04 2025.05.28 Literature Database
SNAP: Efficient Extraction of Private Properties with Poisoning Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21 Backdoor AttackProperty InferenceAttack Method 2022.08.25 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 CybersecurityAttack MethodMachine Learning Technology 2022.08.15 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 Robustness EvaluationPerformance Evaluation MetricsAttack Method 2022.08.12 2025.05.28 Literature Database
Analysis, Detection, and Classification of Android Malware using System Calls Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12 Malware ClassificationMalware Detection MethodAttack Method 2022.08.12 2025.05.28 Literature Database
Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15 Client-Side DefensePoisoningAttack Method 2022.08.11 2025.05.28 Literature Database
Membership Inference Attacks via Adversarial Examples Authors: Hamid Jalalzai, Elie Kadoche, Rémi Leluc, Vincent Plassier | Published: 2022-07-27 | Updated: 2022-11-23 Membership InferenceAttack MethodMachine Learning 2022.07.27 2025.05.28 Literature Database
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26 Performance EvaluationAttack MethodSpeech Recognition Process 2022.07.26 2025.05.28 Literature Database
Careful What You Wish For: on the Extraction of Adversarially Trained Models Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21 PoisoningAttack MethodAdversarial Example 2022.07.21 2025.05.28 Literature Database
Digital Twin-based Intrusion Detection for Industrial Control Systems Authors: Seba Anna Varghese, Alireza Dehlaghi Ghadim, Ali Balador, Zahra Alimadadi, Panos Papadimitratos | Published: 2022-07-20 ML-Based IDSFrameworkAttack Method 2022.07.20 2025.05.28 Literature Database