Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11 Adversarial TrainingVulnerability Assessment MethodComputational Efficiency 2021.05.31 2025.05.28 Literature Database
Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30 PoisoningAdversarial attackVulnerability Assessment Method 2021.05.30 2025.05.28 Literature Database
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 Privacy Protection MethodInformation-Theoretic EvaluationVulnerability Assessment Method 2021.05.27 2025.05.28 Literature Database
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 Data Contamination DetectionPoisoningVulnerability Assessment Method 2021.05.26 2025.05.28 Literature Database
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 PoisoningOptimization MethodsVulnerability Assessment Method 2021.05.23 2025.05.28 Literature Database
Leaky Nets: Recovering Embedded Neural Network Models and Inputs through Simple Power and Timing Side-Channels — Attacks and Defenses Authors: Saurav Maji, Utsav Banerjee, Anantha P. Chandrakasan | Published: 2021-03-26 Model Protection MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.26 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18 Robustness Improvement MethodAdversarial ExampleVulnerability Assessment Method 2020.09.30 2025.05.28 Literature Database
SoK: Certified Robustness for Deep Neural Networks Authors: Linyi Li, Tao Xie, Bo Li | Published: 2020-09-09 | Updated: 2023-04-12 Formal VerificationDeep Learning TechnologyVulnerability Assessment Method 2020.09.09 2025.05.28 Literature Database
Towards Memory Safe Python Enclave for Security Sensitive Computation Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12 Security AssurancePrivacy AssessmentVulnerability Assessment Method 2020.05.12 2025.05.28 Literature Database