You are currently viewing a new version of our website. To view the old version click .

283 Results Found

  • Article
  • Open Access
1 Citations
1,175 Views
19 Pages

11 January 2025

Flight operations data play a central role in ensuring flight safety, optimizing operations, and driving innovation. However, these data have become a key target for cyber-attacks, and are especially vulnerable to property inference attacks. Aiming a...

  • Article
  • Open Access
2 Citations
1,561 Views
23 Pages

Leveraging Multiple Adversarial Perturbation Distances for Enhanced Membership Inference Attack in Federated Learning

  • Fan Xia,
  • Yuhao Liu,
  • Bo Jin,
  • Zheng Yu,
  • Xingwei Cai,
  • Hao Li,
  • Zhiyong Zha,
  • Dai Hou and
  • Kai Peng

18 December 2024

In recent years, federated learning (FL) has gained significant attention for its ability to protect data privacy during distributed training. However, it also introduces new privacy leakage risks. Membership inference attacks (MIAs), which aim to de...

  • Article
  • Open Access
1,295 Views
16 Pages

3 May 2025

Graph neural networks (GNNs) are widely used for graph-structured data. However, GNNs are vulnerable to membership inference attacks (MIAs) in graph classification tasks, which determine whether a graph was in the training set, risking the leakage of...

  • Article
  • Open Access
12 Citations
2,890 Views
24 Pages

29 December 2022

In response to the increasing threat of hypersonic weapons, it is of great importance for the defensive side to achieve fast prediction of their feasible attack domain and online inference of their most probable targets. In this study, an online foot...

  • Article
  • Open Access
1 Citations
2,371 Views
16 Pages

21 January 2022

Taking advantage of precise positioning technology, location-based service (LBS) has brought a lot of convenience to people’s daily life and made the city smarter. However, the LBS applications also bring some challenges to personal location pr...

  • Article
  • Open Access
2 Citations
3,920 Views
25 Pages

14 December 2022

Recent efforts have shown that training data is not secured through the generalization and abstraction of algorithms. This vulnerability to the training data has been expressed through membership inference attacks that seek to discover the use of spe...

  • Article
  • Open Access
1 Citations
2,774 Views
15 Pages

LTU Attacker for Membership Inference

  • Joseph Pedersen,
  • Rafael Muñoz-Gómez,
  • Jiangnan Huang,
  • Haozhe Sun,
  • Wei-Wei Tu and
  • Isabelle Guyon

20 July 2022

We address the problem of defending predictive models, such as machine learning classifiers (Defender models), against membership inference attacks, in both the black-box and white-box setting, when the trainer and the trained model are publicly rele...

  • Article
  • Open Access
4 Citations
5,862 Views
26 Pages

Comparative Analysis of Membership Inference Attacks in Federated and Centralized Learning

  • Ali Abbasi Tadi,
  • Saroj Dayal,
  • Dima Alhadidi and
  • Noman Mohammed

19 November 2023

The vulnerability of machine learning models to membership inference attacks, which aim to determine whether a specific record belongs to the training dataset, is explored in this paper. Federated learning allows multiple parties to independently tra...

  • Article
  • Open Access
2 Citations
1,894 Views
12 Pages

Threshold Filtering for Detecting Label Inference Attacks in Vertical Federated Learning

  • Liansheng Ding,
  • Haibin Bao,
  • Qingzhe Lv,
  • Feng Zhang,
  • Zhouyang Zhang,
  • Jianliang Han and
  • Shuang Ding

8 November 2024

Federated learning, as an emerging machine-learning method, has received widespread attention because it allows users to train locally during the training process and uses relevant cryptographic knowledge to safeguard the privacy of data during model...

  • Article
  • Open Access
7 Citations
3,859 Views
15 Pages

7 September 2023

Machine learning deployment on edge devices has faced challenges such as computational costs and privacy issues. Membership inference attack (MIA) refers to the attack where the adversary aims to infer whether a data sample belongs to the training se...

  • Article
  • Open Access
920 Views
20 Pages

1 October 2025

Graph neural networks (GNNs) are deep learning models that process structured graph data. By leveraging their graphs/node classification and link prediction capabilities, they have been effectively applied in multiple domains such as community detect...

  • Article
  • Open Access
1 Citations
6,031 Views
19 Pages

Targeted Training Data Extraction—Neighborhood Comparison-Based Membership Inference Attacks in Large Language Models

  • Huan Xu,
  • Zhanhao Zhang,
  • Xiaodong Yu,
  • Yingbo Wu,
  • Zhiyong Zha,
  • Bo Xu,
  • Wenfeng Xu,
  • Menglan Hu and
  • Kai Peng

14 August 2024

A large language model refers to a deep learning model characterized by extensive parameters and pretraining on a large-scale corpus, utilized for processing natural language text and generating high-quality text output. The increasing deployment of...

  • Article
  • Open Access
4,594 Views
29 Pages

User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks

  • Farid Yessoufou,
  • Salma Sassi,
  • Elie Chicha,
  • Richard Chbeir and
  • Jules Degila

28 August 2024

With the rise of the Internet of Things (IoT), mobile crowdsourcing has become a leading application, leveraging the ubiquitous presence of smartphone users to collect and process data. Spatial crowdsourcing, which assigns tasks based on users’...

  • Article
  • Open Access
4,995 Views
19 Pages

Membership Inference Attacks Fueled by Few-Shot Learning to Detect Privacy Leakage and Address Data Integrity

  • Daniel Jiménez-López,
  • Nuria Rodríguez-Barroso,
  • M. Victoria Luzón,
  • Javier Del Ser and
  • Francisco Herrera

Deep learning models have an intrinsic privacy issue as they memorize parts of their training data, creating a privacy leakage. Membership inference attacks (MIAs) exploit this to obtain confidential information about the data used for training, aimi...

  • Article
  • Open Access
816 Views
17 Pages

9 October 2025

The secondary use of electronic health records is essential for developing artificial intelligence-based clinical decision support systems. However, even after direct identifiers are removed, de-identified electronic health records remain vulnerable...

  • Article
  • Open Access
1,202 Views
29 Pages

A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function

  • Yangchao He,
  • Jiong Li,
  • Lei Shao,
  • Chijun Zhou and
  • Xiangwei Bu

16 January 2025

This paper proposes a trajectory prediction method via the adaptive cost function to address the difficulties in inferring the attack intention and maneuver mode, as well as the accumulation of prediction error during the trajectory prediction of ree...

  • Article
  • Open Access
61 Citations
12,892 Views
36 Pages

8 April 2010

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system...

  • Article
  • Open Access
1 Citations
2,379 Views
20 Pages

Protecting Private Information for Two Classes of Aggregated Database Queries

  • Xuechao Yang,
  • Xun Yi,
  • Andrei Kelarev,
  • Leanne Rylands,
  • Yuqing Lin and
  • Joe Ryan

An important direction of informatics is devoted to the protection of privacy of confidential information while providing answers to aggregated queries that can be used for analysis of data. Protecting privacy is especially important when aggregated...

  • Article
  • Open Access
2 Citations
975 Views
44 Pages

26 March 2025

In recent years, autonomous maneuver decision-making has emerged as a key technology in autonomous air combat confrontation, garnering widespread attention. A method combining the modified marine predator algorithm (MMPA) and fuzzy inference is propo...

  • Article
  • Open Access
6 Citations
3,777 Views
15 Pages

Is Homomorphic Encryption-Based Deep Learning Secure Enough?

  • Jinmyeong Shin,
  • Seok-Hwan Choi and
  • Yoon-Ho Choi

24 November 2021

As the amount of data collected and analyzed by machine learning technology increases, data that can identify individuals is also being collected in large quantities. In particular, as deep learning technology—which requires a large amount of a...

  • Article
  • Open Access
502 Views
28 Pages

An Agent-Based System for Location Privacy Protection in Location-Based Services

  • Omar F. Aloufi,
  • Ahmed S. Alfakeeh and
  • Fahad M. Alotaibi

Location-based services (LBSs) are a crucial element of the Internet of Things (IoT) and have garnered significant attention from both researchers and users, driven by the rise of wireless devices and a growing user base. However, the use of LBS-enab...

  • Article
  • Open Access
1,129 Views
25 Pages

Neighborhood Deviation Attack Against In-Context Learning

  • Dai Hou,
  • Zhenkai Yang,
  • Lei Zheng,
  • Bo Jin,
  • Huan Xu,
  • Ying Li,
  • Bo Xu and
  • Kai Peng

10 April 2025

In-context learning (ICL) enables large language models (LLMs) to adapt to new tasks using only a few examples, without requiring fine-tuning. However, the new privacy and security risks brought about by this increasing capability have not received e...

  • Article
  • Open Access
1,495 Views
22 Pages

Novel Synthetic Dataset Generation Method with Privacy-Preserving for Intrusion Detection System

  • JaeCheol Kim,
  • Seungun Park,
  • Jaesik Cha,
  • Eunyeong Son and
  • Yunsik Son

30 September 2025

The expansion of Internet of Things (IoT) networks has enabled real-time data collection and automation across smart cities, healthcare, and agriculture, delivering greater convenience and efficiency; however, exposure to diverse threats has also inc...

  • Review
  • Open Access
1,505 Views
21 Pages

Edge intelligence is an emerging paradigm generated by the deep integration of artificial intelligence (AI) and edge computing. It enables data to remain at the edge without being sent to remote cloud servers, lowering response time, saving bandwidth...

  • Article
  • Open Access
2 Citations
1,700 Views
20 Pages

Public administration frequently deals with geographically scattered personal data between multiple government locations and organizations. As digital technologies advance, public administration is increasingly relying on collaborative intelligence w...

  • Article
  • Open Access
7 Citations
4,591 Views
21 Pages

27 December 2022

Critical infrastructure, such as water treatment facilities, largely relies on the effective functioning of industrial control systems (ICSs). Due to the wide adoption of high-speed network and digital infrastructure technologies, these systems are n...

  • Article
  • Open Access
1,585 Views
22 Pages

31 December 2024

This paper presents an approach to protecting deep neural network privacy on edge devices using ARM TrustZone. We propose a selective layer protection technique that balances performance and privacy. Rather than executing entire layers within the Tru...

  • Article
  • Open Access
11 Citations
3,663 Views
21 Pages

20 October 2023

With the development of deep learning, image recognition based on deep learning is now widely used in remote sensing. As we know, the effectiveness of deep learning models significantly benefits from the size and quality of the dataset. However, remo...

  • Article
  • Open Access
6 Citations
4,182 Views
13 Pages

Federated Learning with Dynamic Model Exchange

  • Hannes Hilberger,
  • Sten Hanke and
  • Markus Bödenler

Large amounts of data are needed to train accurate robust machine learning models, but the acquisition of these data is complicated due to strict regulations. While many business sectors often have unused data silos, researchers face the problem of n...

  • Article
  • Open Access
3 Citations
2,412 Views
25 Pages

19 February 2025

The Internet of Things (IoT) is developing quickly, which has led to the development of new opportunities in many different fields. As the number of IoT devices continues to expand, particularly in transportation and healthcare, the need for efficien...

  • Article
  • Open Access
17 Citations
4,892 Views
19 Pages

A Mamdani Type Fuzzy Inference System to Calculate Employee Susceptibility to Phishing Attacks

  • Yahya Lambat,
  • Nick Ayres,
  • Leandros Maglaras and
  • Mohamed Amine Ferrag

29 September 2021

It is a well known fact that the weakest link in a cyber secure system is the people who configure, manage or use it. Security breaches are persistently being attributed to human error. Social engineered based attacks are becoming more sophisticated...

  • Article
  • Open Access
1 Citations
2,637 Views
26 Pages

Detecting Inference Attacks Involving Raw Sensor Data: A Case Study

  • Paul Lachat,
  • Nadia Bennani,
  • Veronika Rehn-Sonigo,
  • Lionel Brunie and
  • Harald Kosch

24 October 2022

With the advent of sensors, more and more services are developed in order to provide customers with insights about their health and their appliances’ energy consumption at home. To do so, these services use new mining algorithms that create new...

  • Article
  • Open Access
4 Citations
2,680 Views
14 Pages

17 February 2020

Location-based social networks have been widely used. However, due to the lack of effective and safe data management, a large number of privacy disclosures commonly occur. Thus, academia and industry have needed to focus more on location privacy prot...

  • Article
  • Open Access
2 Citations
1,915 Views
14 Pages

19 November 2024

With the continuous development of network security situations, the types of attacks increase sharply, but can be divided into symmetric attacks and asymmetric attacks. Symmetric attacks such as phishing and DDoS attacks exploit fixed patterns, resul...

  • Article
  • Open Access
1,480 Views
25 Pages

Mitigating Membership Inference Attacks via Generative Denoising Mechanisms

  • Zhijie Yang,
  • Xiaolong Yan,
  • Guoguang Chen and
  • Xiaoli Tian

24 September 2025

Membership Inference Attacks (MIAs) pose a significant threat to privacy in modern machine learning systems, enabling adversaries to determine whether a specific data record was used during model training. Existing defense techniques often degrade mo...

  • Article
  • Open Access

16 December 2025

Historical inference attacks pose a critical privacy threat in mobile edge computing (MEC), where adversaries exploit long-term task and location patterns to infer users’ sensitive information. To address this challenge, we propose a privacy-pr...

  • Article
  • Open Access
10 Citations
5,049 Views
33 Pages

Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups

  • Aidmar Wainakh,
  • Ephraim Zimmer,
  • Sandeep Subedi,
  • Jens Keim,
  • Tim Grube,
  • Shankar Karuppayah,
  • Alejandro Sanchez Guinea and
  • Max Mühlhäuser

20 December 2022

Deep learning pervades heavy data-driven disciplines in research and development. The Internet of Things and sensor systems, which enable smart environments and services, are settings where deep learning can provide invaluable utility. However, the d...

  • Article
  • Open Access
1 Citations
2,840 Views
17 Pages

17 June 2024

This paper investigates differential privacy in federated learning. This topic has been actively examined in conventional network environments, but few studies have investigated it in the Internet of Vehicles, especially considering various mobility...

  • Article
  • Open Access
13 Citations
3,566 Views
13 Pages

7 April 2021

Recently, damages such as internal system intrusion, network and device vulnerability attacks, malicious code infection, and information leakage due to security attacks are increasing within the smart grid environment. Detailed and dynamic access con...

  • Article
  • Open Access
2 Citations
2,521 Views
18 Pages

10 October 2022

Adversarial examples easily mislead vision systems based on deep neural networks (DNNs) trained with softmax cross entropy (SCE) loss. The vulnerability of DNN comes from the fact that SCE drives DNNs to fit on the training examples, whereas the resu...

  • Article
  • Open Access
19 Citations
3,724 Views
16 Pages

4 June 2021

The article is devoted to the study of convolutional neural network inference in the task of image processing under the influence of visual attacks. Attacks of four different types were considered: simple, involving the addition of white Gaussian noi...

  • Article
  • Open Access
11 Citations
3,471 Views
27 Pages

Flow Table Saturation Attack against Dynamic Timeout Mechanisms in SDN

  • Yi Shen,
  • Chunming Wu,
  • Dezhang Kong and
  • Qiumei Cheng

16 June 2023

Software-defined networking (SDN) enables dynamic management and flexible network control by employing reactive rule installation. Due to high power consumption and cost, current OpenFlow switches only support a limited number of flow rules, which is...

  • Article
  • Open Access
1 Citations
1,727 Views
18 Pages

8 December 2021

Within the scope of mobile privacy, there are many attack methods that can leak users’ private information. The communication between applications can be used to violate permissions and access private information without asking for the user&rsq...

  • Article
  • Open Access
10 Citations
4,020 Views
16 Pages

9 February 2020

Geographical social networks (GSN) is an emerging research area. For example, Foursquare, Yelp, and WeChat are all well-known service providers in this field. These applications are also known as location-based services (LBS). Previous studies have s...

  • Article
  • Open Access
5 Citations
7,047 Views
19 Pages

Data Stealing Attacks against Large Language Models via Backdooring

  • Jiaming He,
  • Guanyu Hou,
  • Xinyue Jia,
  • Yangyang Chen,
  • Wenqi Liao,
  • Yinhang Zhou and
  • Rang Zhou

Large language models (LLMs) have gained immense attention and are being increasingly applied in various domains. However, this technological leap forward poses serious security and privacy concerns. This paper explores a novel approach to data steal...

  • Article
  • Open Access
6 Citations
3,007 Views
16 Pages

Privacy-Preserving Image Template Sharing Using Contrastive Learning

  • Shideh Rezaeifar,
  • Slava Voloshynovskiy,
  • Meisam Asgari Jirhandeh and
  • Vitality Kinakh

3 May 2022

With the recent developments of Machine Learning as a Service (MLaaS), various privacy concerns have been raised. Having access to the user’s data, an adversary can design attacks with different objectives, namely, reconstruction or attribute i...

  • Article
  • Open Access
17 Citations
4,363 Views
22 Pages

Smart Home IoT Network Risk Assessment Using Bayesian Networks

  • Miguel Flores,
  • Diego Heredia,
  • Roberto Andrade and
  • Mariam Ibrahim

10 May 2022

A risk assessment model for a smart home Internet of Things (IoT) network is implemented using a Bayesian network. The directed acyclic graph of the Bayesian network is constructed from an attack graph that details the paths through which different a...

  • Article
  • Open Access
2 Citations
2,410 Views
16 Pages

Due to the wide connection range and open communication environment of internet of vehicle (IoV) devices, they are susceptible to Byzantine attacks and privacy inference attacks, resulting in security and privacy issues in IoV federated learning. The...

  • Article
  • Open Access
1 Citations
3,338 Views
15 Pages

While recent studies addressed security attacks in real-time embedded systems, most of them assumed prior knowledge of parameters of periodic tasks, which is not realistic under many environments. In this paper, we address how to infer task parameter...

  • Article
  • Open Access
5 Citations
2,699 Views
14 Pages

21 September 2023

Federated learning (FL) has been broadly adopted in both academia and industry in recent years. As a bridge to connect the so-called “data islands”, FL has contributed greatly to promoting data utilization. In particular, FL enables disjo...

of 6