An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15

Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14

Practical Vertical Federated Learning with Unsupervised Representation Learning

Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13

Unifying Gradients to Improve Real-world Robustness for Deep Networks

Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24

A Knowledge Distillation-Based Backdoor Attack in Federated Learning

Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12

Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15