Profiler: Profile-Based Model to Detect Phishing Emails Authors: Mariya Shmalko, Alsharif Abuadbba, Raj Gaire, Tingmin Wu, Hye-Young Paik, Surya Nepal | Published: 2022-08-18 2022.08.18 2025.05.28 Literature Database
Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han | Published: 2022-08-18 2022.08.18 2025.05.28 Literature Database
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17 2022.08.17 2025.05.28 Literature Database
An Efficient Multi-Step Framework for Malware Packing Identification Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17 2022.08.17 2025.05.28 Literature Database
FedPerm: Private and Robust Federated Learning by Parameter Permutation Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16 2022.08.16 2025.05.28 Literature Database
CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16 2022.08.16 2025.05.28 Literature Database
Deception for Cyber Defence: Challenges and Opportunities Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15 2022.08.15 2025.05.28 Literature Database
Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14 2022.08.14 2025.05.28 Literature Database
Practical Vertical Federated Learning with Unsupervised Representation Learning Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13 2022.08.13 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 2022.08.12 2025.05.28 Literature Database