Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03

MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks

Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09

A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25

Have it your way: Individualized Privacy Assignment for DP-SGD

Authors: Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot | Published: 2023-03-29 | Updated: 2024-01-19

Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02

Targeted Adversarial Attacks on Wind Power Forecasts

Authors: René Heinrich, Christoph Scholz, Stephan Vogt, Malte Lehna | Published: 2023-03-29 | Updated: 2023-08-17

On the Query Complexity of Training Data Reconstruction in Private Learning

Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11

Oracle Counterpoint: Relationships between On-chain and Off-chain Market Data

Authors: Zhimeng Yang, Ariah Klages-Mundt, Lewis Gudgeon | Published: 2023-03-28 | Updated: 2023-07-27