Challenges and Complexities in Machine Learning based Credit Card Fraud Detection

Authors: Gayan K. Kulatilleke | Published: 2022-08-20

Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures

Authors: Sudeep Pasricha, John Jose, Sujay Deb | Published: 2022-08-18

Mouse Dynamics Behavioral Biometrics: A Survey

Authors: Simon Khan, Charles Devlen, Michael Manno, Daqing Hou | Published: 2022-08-18 | Updated: 2024-05-01

Profiler: Profile-Based Model to Detect Phishing Emails

Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han | Published: 2022-08-18

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17

An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15