Toward More Generalized Malicious URL Detection Models Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09 2022.02.21 2025.05.28 Literature Database
Transferring Adversarial Robustness Through Robust Representation Matching Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05 2022.02.21 2025.05.28 Literature Database
NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks Authors: Haoyu Liu, Paul Patras | Published: 2022-02-20 | Updated: 2022-04-20 2022.02.20 2025.05.28 Literature Database
Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems Authors: Nils Müller, Charalampos Ziras, Kai Heussen | Published: 2022-02-18 | Updated: 2023-01-03 2022.02.18 2025.05.28 Literature Database
An Equivalence Between Data Poisoning and Byzantine Gradient Attacks Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20 2022.02.17 2025.05.28 Literature Database
Understanding and Improving Graph Injection Attack by Promoting Unnoticeability Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05 2022.02.16 2025.05.28 Literature Database
Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14 2022.02.16 2025.05.28 Literature Database
SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service Authors: Songlei Wang, Yifeng Zheng, Xiaohua Jia | Published: 2022-02-16 | Updated: 2023-01-31 2022.02.16 2025.05.28 Literature Database
Defending against Reconstruction Attacks with Rényi Differential Privacy Authors: Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles | Published: 2022-02-15 2022.02.15 2025.05.28 Literature Database
StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24 2022.02.15 2025.05.28 Literature Database