Membership inference attacks on machine learning: A survey

H Hu, Z Salcic, L Sun, G Dobbie, PS Yu… - ACM Computing Surveys …, 2022 - dl.acm.org
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …

A systematic review of human–computer interaction and explainable artificial intelligence in healthcare with artificial intelligence techniques

M Nazar, MM Alam, E Yafi, MM Su'ud - IEEE Access, 2021 - ieeexplore.ieee.org
Artificial intelligence (AI) is one of the emerging technologies. In recent decades, artificial
intelligence (AI) has gained widespread acceptance in a variety of fields, including virtual …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Trustworthy ai: A computational perspective

H Liu, Y Wang, W Fan, X Liu, Y Li, S Jain, Y Liu… - ACM Transactions on …, 2022 - dl.acm.org
In the past few decades, artificial intelligence (AI) technology has experienced swift
developments, changing everyone's daily life and profoundly altering the course of human …

R-gap: Recursive gradient attack on privacy

J Zhu, M Blaschko - arXiv preprint arXiv:2010.07733, 2020 - arxiv.org
Federated learning frameworks have been regarded as a promising approach to break the
dilemma between demands on privacy and the promise of learning from large collections of …

{ML-Doctor}: Holistic risk assessment of inference attacks against machine learning models

Y Liu, R Wen, X He, A Salem, Z Zhang… - 31st USENIX Security …, 2022 - usenix.org
Inference attacks against Machine Learning (ML) models allow adversaries to learn
sensitive information about training data, model parameters, etc. While researchers have …

Apollon: a robust defense system against adversarial machine learning attacks in intrusion detection systems

A Paya, S Arroni, V García-Díaz, A Gómez - Computers & Security, 2024 - Elsevier
Abstract The rise of Adversarial Machine Learning (AML) attacks is presenting a significant
challenge to Intrusion Detection Systems (IDS) and their ability to detect threats. To address …

Algorithm auditing: Managing the legal, ethical, and technological risks of artificial intelligence, machine learning, and associated algorithms

A Koshiyama, E Kazim, P Treleaven - Computer, 2022 - ieeexplore.ieee.org
Algorithms are becoming ubiquitous. However, companies are increasingly alarmed about
their algorithms causing major financial or reputational damage. A new industry is …

Label-only model inversion attacks: Attack with the least information

T Zhu, D Ye, S Zhou, B Liu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In a model inversion attack, an adversary attempts to reconstruct the training data records of
a target model using only the model's output. In launching a contemporary model inversion …

[HTML][HTML] An ensemble face recognition mechanism based on three-way decisions

A Shah, B Ali, M Habib, J Frnda, I Ullah… - Journal of King Saud …, 2023 - Elsevier
The explainable human–computer interaction (HCI) is about designing approaches capable
of using cognitive characteristics like humans. One such characteristic is human vision and …