On the impossibility of non-trivial accuracy under fairness constraints Authors: Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia | Published: 2021-07-14 | Updated: 2021-11-23 Data Privacy AssessmentModel Design and Accuracyevaluation metrics 2021.07.14 2025.05.28 Literature Database
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23 Multi-output ModelVulnerability detectionevaluation metrics 2021.03.23 2025.05.28 Literature Database
Utilising Flow Aggregation to Classify Benign Imitating Attacks Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06 Flow Aggregation MethodAttack Detectionevaluation metrics 2021.03.06 2025.05.28 Literature Database
Differentially Private ADMM Algorithms for Machine Learning Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31 DP-SGDMachine Learning Technologyevaluation metrics 2020.10.31 2025.05.28 Literature Database
Investigating Membership Inference Attacks under Data Dependencies Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum | Published: 2020-10-23 | Updated: 2023-06-14 Property Inference AttackMembership Disclosure Riskevaluation metrics 2020.10.23 2025.05.28 Literature Database
On Primes, Log-Loss Scores and (No) Privacy Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17 Membership InferenceMachine Learningevaluation metrics 2020.09.17 2025.05.28 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database
Learning the Associations of MITRE ATT&CK Adversarial Techniques Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12 Clustering methodsAttack Pattern Extractionevaluation metrics 2020.04.16 2025.05.28 Literature Database
Privacy Enhanced Multimodal Neural Representations for Emotion Recognition Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29 Privacy ManagementAttack Methodevaluation metrics 2019.10.29 2025.05.28 Literature Database