Evaluation Method

The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21
Counterfactual Explanation
Privacy Violation
Evaluation Method

Verifiable Encodings for Secure Homomorphic Analytics

Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04
Privacy Technique
Performance Evaluation Metrics
Evaluation Method

Ransomware Classification and Detection With Machine Learning Algorithms

Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02
Backdoor Attack
Dynamic Analysis
Evaluation Method

Firenze: Model Evaluation Using Weak Signals

Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02
Data Generation
Model Interpretability
Evaluation Method

Multifamily Malware Models

Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27
Algorithm Design
Malware Propagation Means
Evaluation Method

LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks

Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23
Intrusion Detection System
Deep Learning Method
Evaluation Method

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22
Test Prioritization
Vulnerability Analysis
Evaluation Method

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22
DNN IP Protection Method
Adversarial Learning
Evaluation Method

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20
Algorithm Design
Feature Extraction Method
Evaluation Method

Privacy-Preserving Distributed Machine Learning Made Faster

Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12
Privacy Technique
Evaluation Method
Function Definition