QuPiD Attack: Machine Learning‐Based Privacy Quantification Mechanism for PIR Protocols in Health‐Related Web Search

R Khan, A Ahmad, AO Alsayed… - Scientific …, 2020 - Wiley Online Library
… ) attack: a machine learning‐based attack that evaluates the effectiveness of UUP in privacy
protection. QuPiD attack … The results show that the proposed QuPiD attack associates more …

Defending against saddle point attack in Byzantine-robust distributed learning

D Yin, Y Chen, R Kannan… - … on Machine Learning, 2019 - proceedings.mlr.press
… complicated machine learning models often requires finding a local minimum of non-convex
functions, as exemplified by training deep neural networks and other high-capacity learning

Certified robustness to word substitution ranking attack for neural ranking models

C Wu, R Zhang, J Guo, W Chen, Y Fan… - Proceedings of the 31st …, 2022 - dl.acm.org
… of our proposed notion of Certified Top𝐾 Robustness for ranking models to such attacks. …
we do not attack the documents ranked from 1 to 𝐾, since there is no need to attack user’s …

Ranking loss: Maximizing the success rate in deep learning side-channel analysis

G Zaid, L Bossuet, F Dassance, A Habrard… - IACR Transactions on …, 2021 - tches.iacr.org
learning to rankattack was introduced by [CRR03], but their proposal was limited by the
computational complexity. Very similar to profiled attacks, the application of machine learning

Frl: Federated rank learning

H Mozaffari, V Shejwalkar, A Houmansadr - arXiv preprint arXiv …, 2021 - arxiv.org
learning (FL) allows mutually untrusted clients to collaboratively train a common machine
learning … Under this threat model we design a worst case attack on FRL (Algorithm 3), which …

Energy efficient thwarting rank attack from RPL based IoT networks: a review

PS Nandhini, S Kuppuswami, S Malliga - Materials Today: Proceedings, 2023 - Elsevier
… , there is an urge to address rank attack immediately. In this paper, a thorough review on the
effects of rank attack and its … It is a machine learning approach. In the proposed technique, …

[PDF][PDF] Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation.

A Ain, MH Bhuyan, DK Bhattacharyya… - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
… His research interests are in natural language processing, machine learning, artificial
intelligence, bioinformatics and applications of AI techniques to computer and network security. He …

Adversarial machine learning in malware detection: Arms race between evasion attack and defense

L Chen, Y Ye, T Bourlai - 2017 European intelligence and …, 2017 - ieeexplore.ieee.org
… To simulate the evasion attack, we rank each API call and group them into two sets: M (those
highly relevant to malware) and B (those highly relevant to benign files) in the descent …

An Analysis of Untargeted Poisoning Attack and Defense Methods for Federated Online Learning to Rank Systems

S Wang, G Zuccon - Proceedings of the 2023 ACM SIGIR International …, 2023 - dl.acm.org
machine learning models in a distributed way without the need of data sharing, they can be
susceptible to attacks that … In this paper, we consider attacks on FOLTR systems that aim to …

Ml-based detection of rank and blackhole attacks in RPL networks

PP Ioulianou, VG Vassilakis… - … , Networks and Digital …, 2022 - ieeexplore.ieee.org
… the addition of a Machine Learning (ML) module that aims at detecting unknown attacks. ML
algorithms … An important attack that has been studied in this work is the rank attack [13]. In a …