Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26 Membership InferenceInformation Embedding AttackEvaluation Method 2020.10.26 2025.05.28 Literature Database
MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models Authors: Yixi Xu, Sumit Mukherjee, Xiyang Liu, Shruti Tople, Rahul Dodhia, Juan Lavista Ferres | Published: 2020-09-11 | Updated: 2022-10-12 Data GenerationMembership Disclosure RiskEvaluation Method 2020.09.11 2025.05.28 Literature Database
Federated Model Distillation with Noise-Free Differential Privacy Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21 Performance EvaluationMachine Learning TechnologyEvaluation Method 2020.09.11 2025.05.28 Literature Database
Privacy-preserving feature selection: A survey and proposing a new set of protocols Authors: Javad Rahimipour Anaraki, Saeed Samet | Published: 2020-08-17 Privacy-Preserving Data MiningEvaluation MethodWatermark Evaluation 2020.08.17 2025.05.28 Literature Database
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16 Adversarial ExampleMachine Learning TechnologyEvaluation Method 2020.08.16 2025.05.28 Literature Database
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11 Machine Learning TechnologyDecision TreeEvaluation Method 2020.08.11 2025.05.28 Literature Database
How to compare adversarial robustness of classifiers from a global perspective Authors: Niklas Risse, Christina Göpfert, Jan Philip Göpfert | Published: 2020-04-22 | Updated: 2020-10-15 PoisoningRobustness AnalysisEvaluation Method 2020.04.22 2025.05.28 Literature Database
Secure Evaluation of Quantized Neural Networks Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01 Protocol ProcedureModel ArchitectureEvaluation Method 2019.10.28 2025.05.28 Literature Database
Substra: a framework for privacy-preserving, traceable and collaborative Machine Learning Authors: Mathieu N Galtier, Camille Marini | Published: 2019-10-25 Privacy ManagementCooperative SystemEvaluation Method 2019.10.25 2025.05.28 Literature Database
A Note on Our Submission to Track 4 of iDASH 2019 Authors: Marcel Keller, Ke Sun | Published: 2019-10-24 Improvement of LearningEvaluation Methodevaluation metrics 2019.10.24 2025.05.28 Literature Database