Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05 Adversarial Attack MethodsTime-Related FeaturesDeep Learning Method 2022.10.05 2025.05.28 Literature Database
Group Property Inference Attacks Against Graph Neural Networks Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02 Membership InferenceModel Performance EvaluationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02 Model Performance EvaluationAdversarial Attack MethodsCommunication Analysis 2022.09.02 2025.05.28 Literature Database
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25 Algorithm DesignImprovement of LearningAdversarial Attack Methods 2022.06.25 2025.05.28 Literature Database
I Know What You Trained Last Summer: A Survey on Stealing Machine Learning Models and Defences Authors: Daryna Oliynyk, Rudolf Mayer, Andreas Rauber | Published: 2022-06-16 | Updated: 2023-06-06 PoisoningMembership InferenceAdversarial Attack Methods 2022.06.16 2025.05.28 Literature Database
Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.15 2025.05.28 Literature Database
Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13 Training ProtocolAdversarial Attack MethodsDeep Learning Method 2022.06.13 2025.05.28 Literature Database
Darknet Traffic Classification and Adversarial Attacks Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12 Performance EvaluationAdversarial Attack MethodsDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Membership Inference via Backdooring Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10 Attack Methods against DFLMembership InferenceAdversarial Attack Methods 2022.06.10 2025.05.28 Literature Database