Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18 DDoS AttackEnergy-Based ModelAttack Method 2022.03.18 2025.05.28 Literature Database
Generative Models for Security: Attacks, Defenses, and Opportunities Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29 PoisoningAttack MethodGenerative Model 2021.07.21 2025.05.28 Literature Database
Secure Random Sampling in Differential Privacy Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24 Sampling MethodAttack MethodOverview of Floating Point Numbers 2021.07.21 2025.05.28 Literature Database
MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI Authors: Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara | Published: 2021-07-19 Membership InferenceModel InterpretabilityAttack Method 2021.07.19 2025.05.28 Literature Database
Deceptive Logic Locking for Hardware Integrity Protection against Machine Learning Attacks Authors: Dominik Sisejkovic, Farhad Merchant, Lennart M. Reimann, Rainer Leupers | Published: 2021-07-19 Cost ModelLogic LockingAttack Method 2021.07.19 2025.05.28 Literature Database
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11 Text Perturbation MethodBackdoor DetectionAttack Method 2021.03.07 2025.05.28 Literature Database
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05 Watermarking Settings for Medical DataAttack MethodThreat modeling 2021.03.05 2025.05.28 Literature Database
A flow-based IDS using Machine Learning in eBPF Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04 ML-Based IDSWatermarkingAttack Method 2021.02.19 2025.05.28 Literature Database
Perceptually Constrained Adversarial Attacks Authors: Muhammad Zaid Hameed, Andras Gyorgy | Published: 2021-02-14 WatermarkingAttack MethodAdversarial Training 2021.02.14 2025.05.28 Literature Database
“What’s in the box?!”: Deflecting Adversarial Attacks by Randomly Deploying Adversarially-Disjoint Models Authors: Sahar Abdelnabi, Mario Fritz | Published: 2021-02-09 | Updated: 2021-03-09 PoisoningModel Performance EvaluationAttack Method 2021.02.09 2025.05.28 Literature Database