Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database
DI-NIDS: Domain Invariant Network Intrusion Detection System Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15 Performance EvaluationMachine Learning TechnologyDeep Learning Method 2022.10.15 2025.05.28 Literature Database
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14 Backdoor AttackAttack MethodSelf-Supervised Learning 2022.10.13 2025.05.28 Literature Database
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09 Dataset GenerationPerformance EvaluationGenerative Adversarial Network 2022.10.13 2025.05.28 Literature Database
Federated Learning for Tabular Data: Exploring Potential Risk to Privacy Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13 Privacy Risk ManagementPoisoningGenerative Adversarial Network 2022.10.13 2025.05.28 Literature Database
COLLIDER: A Robust Training Framework for Backdoor Data Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13 Core Set Selection MethodDeep Learning MethodDefense Method 2022.10.13 2025.05.28 Literature Database
Anomaly Detection via Federated Learning Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani | Published: 2022-10-12 Model CommunicationIntrusion Detection SystemPerformance Evaluation Metrics 2022.10.12 2025.05.28 Literature Database
BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces Authors: Adam Dorian Wong | Published: 2022-10-12 | Updated: 2022-10-28 DNN IP Protection MethodSecurity AssuranceChallenges of Generative Models 2022.10.12 2025.05.28 Literature Database
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11 Energy ManagementIntrusion Detection SystemMachine Learning Method 2022.10.11 2025.05.28 Literature Database
Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11 PoisoningPerformance Evaluation MetricsAdversarial attack 2022.10.11 2025.05.28 Literature Database