An Efficient Multi-Step Framework for Malware Packing Identification Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17 Program AnalysisMalware Propagation MeansDynamic Analysis 2022.08.17 2025.05.28 Literature Database
FedPerm: Private and Robust Federated Learning by Parameter Permutation Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16 Privacy Risk ManagementPoisoningCommunication Efficiency 2022.08.16 2025.05.28 Literature Database
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16 Relationship of AI SystemsAttack DetectionVulnerability detection 2022.08.16 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 CybersecurityAttack MethodMachine Learning Technology 2022.08.15 2025.05.28 Literature Database
Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14 Malicious Node DetectionAttack DetectionThreat modeling 2022.08.14 2025.05.28 Literature Database
Practical Vertical Federated Learning with Unsupervised Representation Learning Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13 Data Protection MethodPrivacy Risk ManagementCommunication Efficiency 2022.08.13 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 Robustness EvaluationPerformance Evaluation MetricsAttack Method 2022.08.12 2025.05.28 Literature Database
A Knowledge Distillation-Based Backdoor Attack in Federated Learning Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12 Backdoor AttackKnowledge Distillation 2022.08.12 2025.05.28 Literature Database
Analysis, Detection, and Classification of Android Malware using System Calls Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12 Malware ClassificationMalware Detection MethodAttack Method 2022.08.12 2025.05.28 Literature Database
Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15 Client-Side DefensePoisoningAttack Method 2022.08.11 2025.05.28 Literature Database