USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

Computer Penetration (Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers)Подробнее

Computer Penetration (Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers)

USENIX Security '21 - Blind Backdoors in Deep Learning ModelsПодробнее

USENIX Security '21 - Blind Backdoors in Deep Learning Models

USENIX Security '21 - Graph BackdoorПодробнее

USENIX Security '21 - Graph Backdoor

USENIX Security '21 - Poisoning the Unlabeled Dataset of Semi-Supervised LearningПодробнее

USENIX Security '21 - Poisoning the Unlabeled Dataset of Semi-Supervised Learning

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory ImagesПодробнее

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionПодробнее

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy ProtocolsПодробнее

USENIX Security '21 - Data Poisoning Attacks to Local Differential Privacy Protocols

USENIX Security '21 - T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-basedПодробнее

USENIX Security '21 - T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware ClassifiersПодробнее

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

Exploring Backdoor Poisoning Attacks Against Malware ClassifiersПодробнее

Exploring Backdoor Poisoning Attacks Against Malware Classifiers

USENIX Security '21 - The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet ResourcesПодробнее

USENIX Security '21 - The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources

USENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural NetworksПодробнее

USENIX Security '22 - Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

AI/ML Data Poisoning Attacks Explained and Analyzed-TechnicalПодробнее

AI/ML Data Poisoning Attacks Explained and Analyzed-Technical

USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference AccuracyПодробнее

USENIX Security '21 - Hermes Attack: Steal DNN Models with Lossless Inference Accuracy

USENIX Security '23 - VILLAIN: Backdoor Attacks Against Vertical Split LearningПодробнее

USENIX Security '23 - VILLAIN: Backdoor Attacks Against Vertical Split Learning

USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor AttacksПодробнее

USENIX Security '23 - Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks

USENIX Security '21 - Mind Your Weight(s): A Large-scale Study on Insufficient Machine LearningПодробнее

USENIX Security '21 - Mind Your Weight(s): A Large-scale Study on Insufficient Machine Learning

USENIX Security '20 - On Training Robust PDF Malware ClassifiersПодробнее

USENIX Security '20 - On Training Robust PDF Malware Classifiers

USENIX Security '21 - Leakage of Dataset Properties in Multi-Party Machine LearningПодробнее

USENIX Security '21 - Leakage of Dataset Properties in Multi-Party Machine Learning