Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 Model Protection MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.26 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18 Robustness Improvement MethodAdversarial ExampleVulnerability Assessment Method 2020.09.30 2025.05.28 Literature Database
SoK: Certified Robustness for Deep Neural Networks Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12 Formal VerificationDeep Learning TechnologyVulnerability Assessment Method 2020.09.09 2025.05.28 Literature Database
Towards Memory Safe Python Enclave for Security Sensitive Computation Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12 Security AssurancePrivacy AssessmentVulnerability Assessment Method 2020.05.12 2025.05.28 Literature Database
Estimating g-Leakage via Machine Learning Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24 Bayesian ClassificationRole of Machine LearningVulnerability Assessment Method 2020.05.09 2025.05.28 Literature Database
TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09 Attack EvaluationVulnerability Assessment MethodDefense Method 2020.04.09 2025.05.28 Literature Database
Challenges in Forecasting Malicious Events from Incomplete Data Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06 Security AnalysisDataset evaluationVulnerability Assessment Method 2020.04.06 2025.05.28 Literature Database
Artificial Intelligence Techniques for Security Vulnerability Prevention Authors: Steve Kommrusch | Published: 2019-12-14 Machine Learning TechnologyVulnerability Assessment MethodAutomated Vulnerability Remediation 2019.12.14 2025.05.28 Literature Database
Certifiable Robustness to Graph Perturbations Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19 Graph Neural NetworkAttack MethodVulnerability Assessment Method 2019.10.31 2025.05.28 Literature Database