Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense

L Wang, H Yan, X Lin, P Xiong - International Conference on Artificial …, 2023 - Springer
With the continuous promotion and deepened application of Machine Learning-as-a-Service
(MLaaS) across various societal domains, its privacy problems occur frequently and receive …

Perturbing inputs to prevent model stealing

J Grana - 2020 IEEE Conference on Communications and …, 2020 - ieeexplore.ieee.org
We show how perturbing inputs to machine learning services (ML-service) deployed in the
cloud can protect against model stealing attacks. In our formulation, there is an ML-service …

Designing Lightweight Cryptographic Primitives for Securing Industrial Control Systems

S Banerjee - 2024 - researchspace.auckland.ac.nz
The risk of cyber attacks against Industrial Control Systems (ICS) has marked a significant
growth over the past few years. Given ICS has large-scale applications in critical …

Approximation-based monitoring of ongoing model extraction attacks: model similarity tracking to assess the progress of an adversary

C Gustavsson - 2024 - diva-portal.org
Many organizations turn to the promise of artificial intelligence and machine learning (ML)
as its use gains traction in many disciplines. However, developing high-performing ML …

Predictive models for effective policy making against university dropout

Z Stefano, A Del Zozzo, M Gabbrielli - Form@ re-Open Journal per la …, 2020 - hal.science
The mere development of a software to predict University dropout is not sufficient for its
effective implementation in the academic context. In order to exploit it as a tool supporting …

Counterfactual explanations for machine learning models on heterogeneous data

Y Wang - 2023 - dr.ntu.edu.sg
Counterfactual explanation aims to identify minimal and meaningful changes required in an
input instance to produce a different prediction from a given model. Counterfactual …

[图书][B] Toward A Secure Account Recovery: Machine Learning Based User Modeling for protection of Account Recovery in a Managed Environment

A Alubala - 2023 - search.proquest.com
As a result of our heavy reliance on internet usage and running online transactions,
authentication has become a routine part of our daily lives. So, what happens when we lose …

Verify Deep Learning Models Ownership via Preset Embedding

W Yin, H Qian - … & Trusted Vehicles (SmartWorld/UIC/ScalCom …, 2022 - ieeexplore.ieee.org
A well-trained deep neural network (DNNs) requires massive computing resources and
data, therefore it belongs to the model owners' Intellectual Property (IP). Recent works have …

Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack

MAQ Flooding-Based - 2021 - openreview.net
Public intelligent services enabled by machine learning algorithms are vulnerable to model
extraction attacks that can steal confidential information of the learning models through …

Adversarial Attack's Impact on Machine Learning Model in Cyber-Physical Systems

JP Vähäkainu, MJ Lehto, AJE Kariluoto - Journal of Information Warfare, 2020 - JSTOR
Deficiency of correctly implemented and robust defence leaves Internet of Things devices
vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial …