Introducing Model Inversion Attacks on Automatic Speaker Recognition Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09 2023.01.09 2025.04.03 文献データベース
IronForge: An Open, Secure, Fair, Decentralized Federated Learning Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07 2023.01.07 2025.04.03 文献データベース
Linear and non-linear machine learning attacks on physical unclonable functions Authors: Michael Lachner | Published: 2023-01-06 2023.01.06 2025.04.03 文献データベース
TrojanPuzzle: Covertly Poisoning Code-Suggestion Models Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24 2023.01.06 2025.04.03 文献データベース
DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection Authors: Caroline Strickland, Chandrika Saha, Muhammad Zakar, Sareh Nejad, Noshin Tasnim, Daniel Lizotte, Anwar Haque | Published: 2023-01-05 2023.01.05 2025.04.03 文献データベース
Enhancement attacks in biomedical machine learning Authors: Matthew Rosenblatt, Javid Dadashkarimi, Dustin Scheinost | Published: 2023-01-05 | Updated: 2023-08-16 2023.01.05 2025.04.03 文献データベース
Privacy and Efficiency of Communications in Federated Split Learning Authors: Zongshun Zhang, Andrea Pinto, Valeria Turina, Flavio Esposito, Ibrahim Matta | Published: 2023-01-04 | Updated: 2023-01-07 2023.01.04 2025.04.03 文献データベース
Backdoor Attacks Against Dataset Distillation Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03 2023.01.03 2025.04.03 文献データベース
Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03 2023.01.03 2025.04.03 文献データベース
Ranking Differential Privacy Authors: Shirong Xu, Will Wei Sun, Guang Cheng | Published: 2023-01-02 2023.01.02 2025.04.03 文献データベース