Attack Method

DualCF: Efficient Model Extraction Attack from Counterfactual Explanations

Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13
Attack Methods against DFL
Query Generation Method
Attack Method

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09
Malware Classification
Attack Method
Durability Issue

A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection

Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09
Attack Method
Machine Learning Method
Temperature Conditions

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16
Privacy Assessment
User Experience Evaluation
Attack Method

Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection

Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08
Performance Evaluation
Intrusion Detection System
Attack Method

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10
Privacy Enhancing Technology
Attack Method
Communication Efficiency

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27
Cybersecurity
Phishing Attack
Attack Method

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

Authors: Anupama Mishra | Published: 2022-04-27
Cybersecurity
Model Design
Attack Method