Membership Inference Attacks Against Recommender Systems

Authors: Minxing Zhang, Zhaochun Ren, Zihan Wang, Pengjie Ren, Zhumin Chen, Pengfei Hu, Yang Zhang | Published: 2021-09-16

Modern Cybersecurity Solution using Supervised Machine Learning

Authors: Mustafa Sakhai, Maciej Wielgosz | Published: 2021-09-15

Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel

Authors: Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, Changxi Zheng | Published: 2021-09-15

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06

A Crawler Architecture for Harvesting the Clear, Social, and Dark Web for IoT-Related Cyber-Threat Intelligence

Authors: Paris Koloveas, Thanasis Chantzios, Christos Tryfonopoulos, Spiros Skiadopoulos | Published: 2021-09-14

What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams | Published: 2021-09-14

Dodging Attack Using Carefully Crafted Natural Makeup

Authors: Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici | Published: 2021-09-14

The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks

Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13

Formalizing and Estimating Distribution Inference Risks

Authors: Anshuman Suri, David Evans | Published: 2021-09-13 | Updated: 2022-07-05