PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.28 Literature Database
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20 DNN IP Protection MethodPoisoningModel Performance Evaluation 2023.02.21 2025.05.28 Literature Database
Temporal Robustness against Data Poisoning Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06 DNN IP Protection MethodPoisoning AttackThreat modeling 2023.02.07 2025.05.28 Literature Database
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21 DNN IP Protection MethodPoisoningPoisoning Attack 2023.02.03 2025.05.28 Literature Database
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.03 2025.05.28 Literature Database
Deep Learning model integrity checking mechanism using watermarking technique Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21 DNN IP Protection MethodWatermarkingModel Architecture 2023.01.29 2025.05.28 Literature Database
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23 DNN IP Protection MethodWatermarkingAnalysis of Detection Methods 2023.01.23 2025.05.28 Literature Database
Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20 DNN IP Protection MethodIntegration of FL and HEPrivacy Enhancing Technology 2023.01.20 2025.05.28 Literature Database
On the Vulnerability of Backdoor Defenses for Federated Learning Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19 DNN IP Protection MethodPoisoningFeature Importance Analysis 2023.01.19 2025.05.28 Literature Database
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11 DNN IP Protection MethodAdversarial Attack MethodsStructural Attack 2023.01.11 2025.05.28 Literature Database