Computer security paper
Paper list
Paper list
265
Property Inference Attacks Against GANs
ML
GAN
Property inference attacks
268
Local and Central Differential Privacy for Robustness and Privacy in Federated Learning
Federated Learning
Differential privacy
ML
273
Get a Model! Model Hijacking Attack Against Machine Learning Models
Model hijacking attack
ML
277
Interpretable Federated Transformer Log Learning for Cloud Threat Forensics
Threat detection
Forensics
ML
Federated learning
syslogs
289
FedCRI: Federated Mobile Cyber-Risk Intelligence
ML
Federated learning
Android
iOS
Apps
CRI
291
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
Federated Learning
NN
ML
Backdoor attacks
Targeted poisoning attacks
Poisoning attacks
295
What You See is Not What the Network Infers: Detecting Adversarial Examples Based on Semantic Contradiction
Adversarial examples
ML
DNN
AE detection
Autonomous Vehicle
296
ATTEQ-NN: Attention-based QoE-aware Evasive Backdoor Attacks
ML
DNN
Backdoor attacks
567
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction
Malware
ML
Deep learning
Binary reconstruction
586
DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks
ML
Black-box attack
DNN
592
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning
ML
599
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference
GPU
ML
Neural Network
617
ML-Doctor: Holistic Risk Assessment of Inference Attacks Against Machine Learning Models
ML
1991
Phonemic Adversarial Attack against Audio Recognition in Real World
Audio
ML
Adversarial examples