Files
cs249r_book/contents/privacy_security/privacy_security.bib
2024-02-02 17:11:16 -05:00

652 lines
25 KiB
BibTeX

@inproceedings{abadi2016deep,
address = {New York, NY, USA},
author = {Abadi, Martin and Chu, Andy and Goodfellow, Ian and McMahan, H. Brendan and Mironov, Ilya and Talwar, Kunal and Zhang, Li},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security},
date-added = {2023-11-22 18:06:03 -0500},
date-modified = {2023-11-22 18:08:42 -0500},
doi = {10.1145/2976749.2978318},
keywords = {deep learning, differential privacy},
pages = {308--318},
publisher = {ACM},
series = {CCS '16},
source = {Crossref},
title = {Deep Learning with Differential Privacy},
url = {https://doi.org/10.1145/2976749.2978318},
year = {2016}
}
@inproceedings{agrawal2003side,
author = {Agrawal, Dakshi and Baktir, Selcuk and Karakoyunlu, Deniz and Rohatgi, Pankaj and Sunar, Berk},
booktitle = {2007 IEEE Symposium on Security and Privacy (SP '07)},
doi = {10.1109/sp.2007.36},
organization = {Springer},
pages = {29--45},
publisher = {IEEE},
source = {Crossref},
title = {{Trojan} Detection using {IC} Fingerprinting},
url = {https://doi.org/10.1109/sp.2007.36},
year = {2007}
}
@inproceedings{ahmed2020headless,
author = {Ahmed Abdelkader and Michael J. Curry and Liam Fowl and Tom Goldstein and Avi Schwarzschild and Manli Shu and Christoph Studer and Chen Zhu},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icassp/AbdelkaderCFGSS20.bib},
booktitle = {2020 {IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2020, Barcelona, Spain, May 4-8, 2020},
doi = {10.1109/ICASSP40776.2020.9053181},
pages = {3087--3091},
publisher = {{IEEE}},
timestamp = {Thu, 23 Jul 2020 01:00:00 +0200},
title = {Headless Horseman: Adversarial Attacks on Transfer Learning Models},
url = {https://doi.org/10.1109/ICASSP40776.2020.9053181},
year = {2020}
}
@inproceedings{amiel2006fault,
author = {Amiel, Frederic and Clavier, Christophe and Tunstall, Michael},
booktitle = {International Workshop on Fault Diagnosis and Tolerance in Cryptography},
date-added = {2023-11-22 16:45:05 -0500},
date-modified = {2023-11-22 16:45:55 -0500},
organization = {Springer},
pages = {223--236},
title = {Fault analysis of {DPA}-resistant algorithms},
year = {2006}
}
@inproceedings{antonakakis2017understanding,
author = {Antonakakis, Manos and April, Tim and Bailey, Michael and Bernhard, Matt and Bursztein, Elie and Cochran, Jaime and Durumeric, Zakir and Halderman, J Alex and Invernizzi, Luca and Kallitsis, Michalis and others},
booktitle = {26th USENIX security symposium (USENIX Security 17)},
pages = {1093--1110},
title = {Understanding the mirai botnet},
year = {2017}
}
@inproceedings{Asonov2004Keyboard,
author = {Asonov, D. and Agrawal, R.},
booktitle = {IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004},
date-added = {2023-11-22 17:05:39 -0500},
date-modified = {2023-11-22 17:06:45 -0500},
doi = {10.1109/secpri.2004.1301311},
organization = {IEEE},
pages = {3--11},
publisher = {IEEE},
source = {Crossref},
title = {Keyboard acoustic emanations},
url = {https://doi.org/10.1109/secpri.2004.1301311},
year = {2004}
}
@article{ateniese2015hacking,
author = {Ateniese, Giuseppe and Mancini, Luigi V. and Spognardi, Angelo and Villani, Antonio and Vitali, Domenico and Felici, Giovanni},
date-added = {2023-11-22 16:14:42 -0500},
date-modified = {2023-11-22 16:15:42 -0500},
doi = {10.1504/ijsn.2015.071829},
issn = {1747-8405, 1747-8413},
journal = {Int. J. Secur. Netw.},
number = {3},
pages = {137},
publisher = {Inderscience Publishers},
source = {Crossref},
title = {Hacking smart machines with smarter ones: {How} to extract meaningful data from machine learning classifiers},
url = {https://doi.org/10.1504/ijsn.2015.071829},
volume = {10},
year = {2015}
}
@inproceedings{barenghi2010low,
author = {Barenghi, Alessandro and Bertoni, Guido M. and Breveglieri, Luca and Pellicioli, Mauro and Pelosi, Gerardo},
booktitle = {2010 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST)},
date-added = {2023-11-22 16:42:05 -0500},
date-modified = {2023-11-22 16:43:09 -0500},
doi = {10.1109/hst.2010.5513121},
organization = {IEEE},
pages = {7--12},
publisher = {IEEE},
source = {Crossref},
title = {Low voltage fault attacks to {AES}},
url = {https://doi.org/10.1109/hst.2010.5513121},
year = {2010}
}
@inproceedings{Biega2020Oper,
author = {Asia J. Biega and Peter Potash and Hal Daum{\'{e}} III and Fernando Diaz and Mich{\`{e}}le Finck},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sigir/BiegaPDDF20.bib},
booktitle = {Proceedings of the 43rd International {ACM} {SIGIR} conference on research and development in Information Retrieval, {SIGIR} 2020, Virtual Event, China, July 25-30, 2020},
doi = {10.1145/3397271.3401034},
editor = {Jimmy Huang and Yi Chang and Xueqi Cheng and Jaap Kamps and Vanessa Murdock and Ji{-}Rong Wen and Yiqun Liu},
pages = {399--408},
publisher = {{ACM}},
timestamp = {Thu, 03 Sep 2020 01:00:00 +0200},
title = {Operationalizing the Legal Principle of Data Minimization for Personalization},
url = {https://doi.org/10.1145/3397271.3401034},
year = {2020}
}
@inproceedings{biggio2012poisoning,
author = {Battista Biggio and Blaine Nelson and Pavel Laskov},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icml/BiggioNL12.bib},
booktitle = {Proceedings of the 29th International Conference on Machine Learning, {ICML} 2012, Edinburgh, Scotland, UK, June 26 - July 1, 2012},
publisher = {icml.cc / Omnipress},
timestamp = {Wed, 03 Apr 2019 01:00:00 +0200},
title = {Poisoning Attacks against Support Vector Machines},
url = {http://icml.cc/2012/papers/880.pdf},
year = {2012}
}
@article{breier2018deeplaser,
author = {Breier, Jakub and Hou, Xiaolu and Jap, Dirmanto and Ma, Lei and Bhasin, Shivam and Liu, Yang},
journal = {ArXiv preprint},
title = {Deeplaser: {Practical} fault attack on deep neural networks},
url = {https://arxiv.org/abs/1806.05859},
volume = {abs/1806.05859},
year = {2018}
}
@article{Burnet1989Spycatcher,
author = {Burnet, David and Thomas, Richard},
date-added = {2023-11-22 17:03:00 -0500},
date-modified = {2023-11-22 17:04:44 -0500},
doi = {10.2307/1410360},
issn = {0263-323X},
journal = {J. Law Soc.},
number = {2},
pages = {210},
publisher = {JSTOR},
source = {Crossref},
title = {Spycatcher: {The} Commodification of Truth},
url = {https://doi.org/10.2307/1410360},
volume = {16},
year = {1989}
}
@article{cavoukian2009privacy,
author = {Cavoukian, Ann},
date-added = {2023-11-22 17:55:45 -0500},
date-modified = {2023-11-22 17:56:58 -0500},
journal = {Office of the Information and Privacy Commissioner},
title = {Privacy by design},
year = {2009}
}
@book{dhanjani2015abusing,
author = {Greengard, Samuel},
date-added = {2023-11-22 17:09:41 -0500},
date-modified = {2023-11-22 17:10:22 -0500},
doi = {10.7551/mitpress/10277.001.0001},
isbn = {9780262328937},
publisher = {The MIT Press},
source = {Crossref},
title = {The Internet of Things},
url = {https://doi.org/10.7551/mitpress/10277.001.0001},
year = {2015}
}
@inproceedings{Dwork2006Theory,
address = {Berlin, Heidelberg},
author = {Dwork, Cynthia and McSherry, Frank and Nissim, Kobbi and Smith, Adam},
booktitle = {Theory of Cryptography},
date-added = {2023-11-22 18:04:12 -0500},
date-modified = {2023-11-22 18:05:20 -0500},
editor = {Halevi, Shai and Rabin, Tal},
pages = {265--284},
publisher = {Springer Berlin Heidelberg},
title = {Calibrating Noise to Sensitivity in Private Data Analysis},
year = {2006}
}
@article{eldan2023whos,
author = {Eldan, Ronen and Russinovich, Mark},
journal = {ArXiv preprint},
title = {Who's Harry Potter? Approximate Unlearning in {LLMs}},
url = {https://arxiv.org/abs/2310.02238},
volume = {abs/2310.02238},
year = {2023}
}
@article{eykholt2018robust,
author = {Eykholt, Kevin and Evtimov, Ivan and Fernandes, Earlence and Li, Bo and Rahmati, Amir and Xiao, Chaowei and Prakash, Atul and Kohno, Tadayoshi and Song, Dawn},
journal = {ArXiv preprint},
title = {Robust Physical-World Attacks on Deep Learning Models},
url = {https://arxiv.org/abs/1707.08945},
volume = {abs/1707.08945},
year = {2017}
}
@article{farwell2011stuxnet,
author = {Farwell, James P. and Rohozinski, Rafal},
date-added = {2023-11-22 14:03:31 -0500},
date-modified = {2023-11-22 14:05:19 -0500},
doi = {10.1080/00396338.2011.555586},
issn = {0039-6338, 1468-2699},
journal = {Survival},
number = {1},
pages = {23--40},
publisher = {Informa UK Limited},
source = {Crossref},
title = {Stuxnet and the Future of Cyber War},
url = {https://doi.org/10.1080/00396338.2011.555586},
volume = {53},
year = {2011}
}
@inproceedings{gandolfi2001electromagnetic,
author = {Gandolfi, Karine and Mourtel, Christophe and Olivier, Francis},
booktitle = {Cryptographic Hardware and Embedded Systems{\textemdash}CHES 2001: Third International Workshop Paris, France, May 14{\textendash}16, 2001 Proceedings 3},
date-added = {2023-11-22 16:56:42 -0500},
date-modified = {2023-11-22 16:57:40 -0500},
organization = {Springer},
pages = {251--261},
title = {Electromagnetic analysis: {Concrete} results},
year = {2001}
}
@article{Gao2020Physical,
author = {Gao, Yansong and Al-Sarawi, Said F. and Abbott, Derek},
date-added = {2023-11-22 17:52:20 -0500},
date-modified = {2023-11-22 17:54:56 -0500},
doi = {10.1038/s41928-020-0372-5},
issn = {2520-1131},
journal = {Nature Electronics},
number = {2},
pages = {81--91},
publisher = {Springer Science and Business Media LLC},
source = {Crossref},
title = {Physical unclonable functions},
url = {https://doi.org/10.1038/s41928-020-0372-5},
volume = {3},
year = {2020}
}
@inproceedings{gnad2017voltage,
author = {Gnad, Dennis R. E. and Oboril, Fabian and Tahoori, Mehdi B.},
booktitle = {2017 27th International Conference on Field Programmable Logic and Applications (FPL)},
date-added = {2023-11-22 17:07:13 -0500},
date-modified = {2023-11-22 17:07:59 -0500},
doi = {10.23919/fpl.2017.8056840},
organization = {IEEE},
pages = {1--7},
publisher = {IEEE},
source = {Crossref},
title = {Voltage drop-based fault attacks on {FPGAs} using valid bitstreams},
url = {https://doi.org/10.23919/fpl.2017.8056840},
year = {2017}
}
@article{goodfellow2020generative,
author = {Goodfellow, Ian and Pouget-Abadie, Jean and Mirza, Mehdi and Xu, Bing and Warde-Farley, David and Ozair, Sherjil and Courville, Aaron and Bengio, Yoshua},
doi = {10.1145/3422622},
issn = {0001-0782, 1557-7317},
journal = {Commun. ACM},
number = {11},
pages = {139--144},
publisher = {Association for Computing Machinery (ACM)},
source = {Crossref},
title = {Generative adversarial networks},
url = {https://doi.org/10.1145/3422622},
volume = {63},
year = {2020}
}
@article{Gupta2023ChatGPT,
author = {Gupta, Maanak and Akiri, Charankumar and Aryal, Kshitiz and Parker, Eli and Praharaj, Lopamudra},
date-added = {2023-11-22 18:01:41 -0500},
date-modified = {2023-11-22 18:02:55 -0500},
doi = {10.1109/access.2023.3300381},
issn = {2169-3536},
journal = {\#IEEE\_O\_ACC\#},
pages = {80218--80245},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
source = {Crossref},
title = {From {ChatGPT} to {ThreatGPT:} {Impact} of Generative {AI} in Cybersecurity and Privacy},
url = {https://doi.org/10.1109/access.2023.3300381},
volume = {11},
year = {2023}
}
@article{hosseini2017deceiving,
author = {Hosseini, Hossein and Kannan, Sreeram and Zhang, Baosen and Poovendran, Radha},
journal = {ArXiv preprint},
title = {Deceiving google's perspective api built for detecting toxic comments},
url = {https://arxiv.org/abs/1702.08138},
volume = {abs/1702.08138},
year = {2017}
}
@inproceedings{hsiao2023mavfi,
author = {Hsiao, Yu-Shun and Wan, Zishen and Jia, Tianyu and Ghosal, Radhika and Mahmoud, Abdulrahman and Raychowdhury, Arijit and Brooks, David and Wei, Gu-Yeon and Reddi, Vijay Janapa},
booktitle = {2023 Design, Automation \& Test in Europe Conference \& Exhibition (DATE)},
date-added = {2023-11-22 16:54:11 -0500},
date-modified = {2023-11-22 16:55:12 -0500},
doi = {10.23919/date56975.2023.10137246},
organization = {IEEE},
pages = {1--6},
publisher = {IEEE},
source = {Crossref},
title = {{MAVFI:} {An} End-to-End Fault Analysis Framework with Anomaly Detection and Recovery for Micro Aerial Vehicles},
url = {https://doi.org/10.23919/date56975.2023.10137246},
year = {2023}
}
@inproceedings{hutter2009contact,
author = {Hutter, Michael and Schmidt, Jorn-Marc and Plos, Thomas},
booktitle = {2009 European Conference on Circuit Theory and Design},
date-added = {2023-11-22 16:43:29 -0500},
date-modified = {2023-11-22 16:44:30 -0500},
doi = {10.1109/ecctd.2009.5275012},
organization = {IEEE},
pages = {409--412},
publisher = {IEEE},
source = {Crossref},
title = {Contact-based fault injections and power analysis on {RFID} tags},
url = {https://doi.org/10.1109/ecctd.2009.5275012},
year = {2009}
}
@book{joye2012fault,
author = {Joye, Marc and Tunstall, Michael},
date-added = {2023-11-22 16:35:24 -0500},
date-modified = {2023-11-22 16:36:20 -0500},
doi = {10.1007/978-3-642-29656-7},
isbn = {9783642296550, 9783642296567},
issn = {1619-7100},
publisher = {Springer Berlin Heidelberg},
source = {Crossref},
title = {Fault Analysis in Cryptography},
url = {https://doi.org/10.1007/978-3-642-29656-7},
year = {2012}
}
@article{kairouz2021advances,
author = {Kairouz, Peter and McMahan, H. Brendan and Avent, Brendan and Bellet, Aur\'elien and Bennis, Mehdi and Nitin Bhagoji, Arjun and Bonawitz, Kallista and Charles, Zachary and Cormode, Graham and Cummings, Rachel and D{\textquoteright}Oliveira, Rafael G. L. and Eichner, Hubert and El Rouayheb, Salim and Evans, David and Gardner, Josh and Garrett, Zachary and Gasc\'on, Adri\`a and Ghazi, Badih and Gibbons, Phillip B. and Gruteser, Marco and Harchaoui, Zaid and He, Chaoyang and He, Lie and Huo, Zhouyuan and Hutchinson, Ben and Hsu, Justin and Jaggi, Martin and Javidi, Tara and Joshi, Gauri and Khodak, Mikhail and Konecn\'y, Jakub and Korolova, Aleksandra and Koushanfar, Farinaz and Koyejo, Sanmi and Lepoint, Tancr\`ede and Liu, Yang and Mittal, Prateek and Mohri, Mehryar and Nock, Richard and \"Ozg\"ur, Ayfer and Pagh, Rasmus and Qi, Hang and Ramage, Daniel and Raskar, Ramesh and Raykova, Mariana and Song, Dawn and Song, Weikang and Stich, Sebastian U. and Sun, Ziteng and Suresh, Ananda Theertha and Tram\`er, Florian and Vepakomma, Praneeth and Wang, Jianyu and Xiong, Li and Xu, Zheng and Yang, Qiang and Yu, Felix X. and Yu, Han and Zhao, Sen},
bdsk-url-1 = {http://dx.doi.org/10.1561/2200000083},
date-added = {2023-11-22 19:14:08 -0500},
date-modified = {2023-11-22 19:14:08 -0500},
doi = {10.1561/2200000083},
issn = {1935-8237, 1935-8245},
journal = {Foundations and Trends{\textregistered} in Machine Learning},
number = {1{\textendash}2},
pages = {1--210},
publisher = {Now Publishers},
source = {Crossref},
title = {Advances and Open Problems in Federated Learning},
url = {https://doi.org/10.1561/2200000083},
volume = {14},
year = {2021}
}
@inproceedings{khan2021knowledgeadaptation,
author = {Mohammad Emtiyaz Khan and Siddharth Swaroop},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/nips/KhanS21.bib},
booktitle = {Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, NeurIPS 2021, December 6-14, 2021, virtual},
editor = {Marc'Aurelio Ranzato and Alina Beygelzimer and Yann N. Dauphin and Percy Liang and Jennifer Wortman Vaughan},
pages = {19757--19770},
timestamp = {Tue, 03 May 2022 01:00:00 +0200},
title = {Knowledge-Adaptation Priors},
url = {https://proceedings.neurips.cc/paper/2021/hash/a4380923dd651c195b1631af7c829187-Abstract.html},
year = {2021}
}
@inproceedings{kocher1999differential,
author = {Kocher, Paul and Jaffe, Joshua and Jun, Benjamin},
booktitle = {Advances in Cryptology{\textemdash}CRYPTO'99: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15{\textendash}19, 1999 Proceedings 19},
date-added = {2023-11-22 16:55:28 -0500},
date-modified = {2023-11-22 16:56:18 -0500},
organization = {Springer},
pages = {388--397},
title = {Differential power analysis},
year = {1999}
}
@article{Kocher2011Intro,
author = {Kocher, Paul and Jaffe, Joshua and Jun, Benjamin and Rohatgi, Pankaj},
date-added = {2023-11-22 16:58:42 -0500},
date-modified = {2023-11-22 17:00:36 -0500},
doi = {10.1007/s13389-011-0006-y},
issn = {2190-8508, 2190-8516},
journal = {Journal of Cryptographic Engineering},
number = {1},
pages = {5--27},
publisher = {Springer Science and Business Media LLC},
source = {Crossref},
title = {Introduction to differential power analysis},
url = {https://doi.org/10.1007/s13389-011-0006-y},
volume = {1},
year = {2011}
}
@inproceedings{Kocher2018spectre,
author = {Kocher, Paul and Horn, Jann and Fogh, Anders and Genkin, Daniel and Gruss, Daniel and Haas, Werner and Hamburg, Mike and Lipp, Moritz and Mangard, Stefan and Prescher, Thomas and Schwarz, Michael and Yarom, Yuval},
booktitle = {2019 IEEE Symposium on Security and Privacy (SP)},
date-added = {2023-11-22 16:33:35 -0500},
date-modified = {2023-11-22 16:34:01 -0500},
doi = {10.1109/sp.2019.00002},
publisher = {IEEE},
source = {Crossref},
title = {Spectre Attacks: {Exploiting} Speculative Execution},
url = {https://doi.org/10.1109/sp.2019.00002},
year = {2019}
}
@article{Li2020Federated,
author = {Li, Tian and Sahu, Anit Kumar and Talwalkar, Ameet and Smith, Virginia},
date-added = {2023-11-22 19:15:13 -0500},
date-modified = {2023-11-22 19:17:19 -0500},
doi = {10.1109/msp.2020.2975749},
issn = {1053-5888, 1558-0792},
journal = {IEEE Signal Process Mag.},
number = {3},
pages = {50--60},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
source = {Crossref},
title = {Federated Learning: {Challenges,} Methods, and Future Directions},
url = {https://doi.org/10.1109/msp.2020.2975749},
volume = {37},
year = {2020}
}
@inproceedings{Lipp2018meltdown,
author = {Kocher, Paul and Horn, Jann and Fogh, Anders and Genkin, Daniel and Gruss, Daniel and Haas, Werner and Hamburg, Mike and Lipp, Moritz and Mangard, Stefan and Prescher, Thomas and Schwarz, Michael and Yarom, Yuval},
booktitle = {2019 IEEE Symposium on Security and Privacy (SP)},
date-added = {2023-11-22 16:32:26 -0500},
date-modified = {2023-11-22 16:33:08 -0500},
doi = {10.1109/sp.2019.00002},
publisher = {IEEE},
source = {Crossref},
title = {Spectre Attacks: {Exploiting} Speculative Execution},
url = {https://doi.org/10.1109/sp.2019.00002},
year = {2019}
}
@article{miller2015remote,
author = {Miller, Charlie and Valasek, Chris},
date-added = {2023-11-22 17:11:27 -0500},
date-modified = {2023-11-22 17:12:18 -0500},
journal = {Black Hat USA},
number = {S 91},
pages = {1--91},
title = {Remote exploitation of an unaltered passenger vehicle},
volume = {2015},
year = {2015}
}
@article{miller2019lessons,
author = {Miller, Charlie},
date-added = {2023-11-22 16:12:04 -0500},
date-modified = {2023-11-22 16:13:31 -0500},
doi = {10.1109/mdat.2018.2863106},
issn = {2168-2356, 2168-2364},
journal = {IEEE Design \& Test},
number = {6},
pages = {7--9},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
source = {Crossref},
title = {Lessons learned from hacking a car},
url = {https://doi.org/10.1109/mdat.2018.2863106},
volume = {36},
year = {2019}
}
@article{narayanan2006break,
author = {Narayanan, Arvind and Shmatikov, Vitaly},
date-added = {2023-11-22 16:16:19 -0500},
date-modified = {2023-11-22 16:16:59 -0500},
journal = {arXiv preprint cs/0610105},
title = {How to break anonymity of the netflix prize dataset},
year = {2006}
}
@article{oliynyk2023know,
author = {Oliynyk, Daryna and Mayer, Rudolf and Rauber, Andreas},
date-added = {2023-11-22 16:18:21 -0500},
date-modified = {2023-11-22 16:20:44 -0500},
doi = {10.1145/3595292},
issn = {0360-0300, 1557-7341},
journal = {ACM Comput. Surv.},
keywords = {model stealing, Machine learning, model extraction},
number = {14s},
pages = {1--41},
publisher = {Association for Computing Machinery (ACM)},
source = {Crossref},
title = {I Know What You Trained Last Summer: {A} Survey on Stealing Machine Learning Models and Defences},
url = {https://doi.org/10.1145/3595292},
volume = {55},
year = {2023}
}
@article{oprea2022poisoning,
author = {Oprea, Alina and Singhal, Anoop and Vassilev, Apostol},
doi = {10.1109/mc.2022.3190787},
issn = {0018-9162, 1558-0814},
journal = {Computer},
number = {11},
pages = {94--99},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
source = {Crossref},
title = {Poisoning Attacks Against Machine Learning: {Can} Machine Learning Be Trustworthy?},
url = {https://doi.org/10.1109/mc.2022.3190787},
volume = {55},
year = {2022}
}
@article{parrish2023adversarial,
author = {Parrish, Alicia and Kirk, Hannah Rose and Quaye, Jessica and Rastogi, Charvi and Bartolo, Max and Inel, Oana and Ciro, Juan and Mosquera, Rafael and Howard, Addison and Cukierski, Will and Sculley, D. and Reddi, Vijay Janapa and Aroyo, Lora},
journal = {ArXiv preprint},
title = {Adversarial Nibbler: {A} Data-Centric Challenge for Improving the Safety of Text-to-Image Models},
url = {https://arxiv.org/abs/2305.14384},
volume = {abs/2305.14384},
year = {2023}
}
@inproceedings{ramesh2021zero,
author = {Aditya Ramesh and Mikhail Pavlov and Gabriel Goh and Scott Gray and Chelsea Voss and Alec Radford and Mark Chen and Ilya Sutskever},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icml/RameshPGGVRCS21.bib},
booktitle = {Proceedings of the 38th International Conference on Machine Learning, {ICML} 2021, 18-24 July 2021, Virtual Event},
editor = {Marina Meila and Tong Zhang},
pages = {8821--8831},
publisher = {{PMLR}},
series = {Proceedings of Machine Learning Research},
timestamp = {Wed, 25 Aug 2021 01:00:00 +0200},
title = {Zero-Shot Text-to-Image Generation},
url = {http://proceedings.mlr.press/v139/ramesh21a.html},
volume = {139},
year = {2021}
}
@inproceedings{Rashmi2018Secure,
author = {R.V., Rashmi and A., Karthikeyan},
booktitle = {2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA)},
date-added = {2023-11-22 17:50:16 -0500},
date-modified = {2023-11-22 17:51:39 -0500},
doi = {10.1109/iceca.2018.8474730},
pages = {291--298},
publisher = {IEEE},
source = {Crossref},
title = {Secure boot of Embedded Applications - A Review},
url = {https://doi.org/10.1109/iceca.2018.8474730},
year = {2018}
}
@inproceedings{rombach2022highresolution,
author = {Rombach, Robin and Blattmann, Andreas and Lorenz, Dominik and Esser, Patrick and Ommer, Bjorn},
booktitle = {2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)},
doi = {10.1109/cvpr52688.2022.01042},
publisher = {IEEE},
source = {Crossref},
title = {High-Resolution Image Synthesis with Latent Diffusion Models},
url = {https://doi.org/10.1109/cvpr52688.2022.01042},
year = {2022}
}
@article{shan2023prompt,
author = {Shan, Shawn and Ding, Wenxin and Passananti, Josephine and Zheng, Haitao and Zhao, Ben Y},
journal = {ArXiv preprint},
title = {Prompt-Specific Poisoning Attacks on Text-to-Image Generative Models},
url = {https://arxiv.org/abs/2310.13828},
volume = {abs/2310.13828},
year = {2023}
}
@inproceedings{skorobogatov2003optical,
author = {Skorobogatov, Sergei P and Anderson, Ross J},
booktitle = {Cryptographic Hardware and Embedded Systems-CHES 2002: 4th International Workshop Redwood Shores, CA, USA, August 13{\textendash}15, 2002 Revised Papers 4},
organization = {Springer},
pages = {2--12},
title = {Optical fault induction attacks},
year = {2003}
}
@inproceedings{skorobogatov2009local,
author = {Skorobogatov, Sergei},
booktitle = {2009 IEEE International Workshop on Hardware-Oriented Security and Trust},
doi = {10.1109/hst.2009.5225028},
organization = {IEEE},
pages = {1--6},
publisher = {IEEE},
source = {Crossref},
title = {Local heating attacks on Flash memory devices},
url = {https://doi.org/10.1109/hst.2009.5225028},
year = {2009}
}
@article{tarun2023deep,
author = {Tarun, Ayush K and Chundawat, Vikram S and Mandal, Murari and Kankanhalli, Mohan},
journal = {ArXiv preprint},
title = {Deep Regression Unlearning},
url = {https://arxiv.org/abs/2210.08196},
volume = {abs/2210.08196},
year = {2022}
}
@inproceedings{zhao2018fpga,
author = {Zhao, Mark and Suh, G. Edward},
booktitle = {2018 IEEE Symposium on Security and Privacy (SP)},
date-added = {2023-11-22 17:08:21 -0500},
date-modified = {2023-11-22 17:09:07 -0500},
doi = {10.1109/sp.2018.00049},
organization = {IEEE},
pages = {229--244},
publisher = {IEEE},
source = {Crossref},
title = {{FPGA}-Based Remote Power Side-Channel Attacks},
url = {https://doi.org/10.1109/sp.2018.00049},
year = {2018}
}
@article{rosa2021,
author = {G. H. de Rosa and J. P. Papa},
journal = {Pattern Recognition},
title = {A survey on text generation using generative adversarial networks},
year = {2021},
doi = {10.1016/j.patcog.2021.108098}
}
@article{jin2020towards,
title={Towards utilizing unlabeled data in federated learning: A survey and prospective},
author={Jin, Yilun and Wei, Xiguang and Liu, Yang and Yang, Qiang},
journal={arXiv preprint arXiv:2002.11545},
year={2020}
}