Attack Method

Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18
DDoS Attack
Energy-Based Model
Attack Method

Generative Models for Security: Attacks, Defenses, and Opportunities

Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29
Poisoning
Attack Method
Generative Model

Secure Random Sampling in Differential Privacy

Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24
Sampling Method
Attack Method
Overview of Floating Point Numbers

MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI

Authors: Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara | Published: 2021-07-19
Membership Inference
Model Interpretability
Attack Method

Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks

Authors: Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Rainer Leupers | Published: 2021-07-19
Cost Model
Logic Locking
Attack Method

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11
Text Perturbation Method
Backdoor Detection
Attack Method

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems

Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05
Watermarking Settings for Medical Data
Attack Method
Threat modeling

A flow-based IDS using Machine Learning in eBPF

Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04
ML-Based IDS
Watermarking
Attack Method

Perceptually Constrained Adversarial Attacks

Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14
Watermarking
Attack Method
Adversarial Training

“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models

Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09
Poisoning
Model Performance Evaluation
Attack Method