DualCF: Efficient Model Extraction Attack from Counterfactual Explanations Authors: Yongjie Wang, Hangwei Qian, Chunyan Miao | Published: 2022-05-13 Attack Methods against DFLQuery Generation MethodAttack Method 2022.05.13 2025.05.28 Literature Database
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 Performance EvaluationMembership InferenceAttack Method 2022.05.13 2025.05.28 Literature Database
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 Performance EvaluationMembership InferenceAttack Method 2022.05.12 2025.05.28 Literature Database
Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09 Malware ClassificationAttack MethodDurability Issue 2022.05.09 2025.05.28 Literature Database
A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09 Attack MethodMachine Learning MethodTemperature Conditions 2022.05.09 2025.05.28 Literature Database
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16 Privacy AssessmentUser Experience EvaluationAttack Method 2022.05.08 2025.05.28 Literature Database
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08 Performance EvaluationIntrusion Detection SystemAttack Method 2022.05.08 2025.05.28 Literature Database
Fusion: Efficient and Secure Inference Resilient to Malicious Servers Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10 Privacy Enhancing TechnologyAttack MethodCommunication Efficiency 2022.05.06 2025.05.28 Literature Database
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27 CybersecurityPhishing AttackAttack Method 2022.04.27 2025.05.28 Literature Database
Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier Authors: Anupama Mishra | Published: 2022-04-27 CybersecurityModel DesignAttack Method 2022.04.27 2025.05.28 Literature Database