Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference

Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu | Published: 2022-09-04

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere | Published: 2022-09-04

Data Provenance via Differential Auditing

Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04

Phishing URL Detection: A Network-based Approach Robust to Evasion

Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03

Group Property Inference Attacks Against Graph Neural Networks

Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02

Exploiting Fairness to Enhance Sensitive Attributes Reconstruction

Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02

Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02

CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach

Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31