Distributed data analytics Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26 2022.03.26 2025.05.28 Literature Database
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25 2022.03.25 2025.05.28 Literature Database
Email Summarization to Assist Users in Phishing Identification Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24 2022.03.24 2025.05.28 Literature Database
MERLIN — Malware Evasion with Reinforcement LearnINg Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30 2022.03.24 2025.05.28 Literature Database
Powerful Physical Adversarial Examples Against Practical Face Recognition Systems Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki | Published: 2022-03-23 2022.03.23 2025.05.28 Literature Database
Ethereum Fraud Detection with Heterogeneous Graph Neural Networks Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04 2022.03.23 2025.05.28 Literature Database
Online Encrypted Skype Identification Based on an Updating Mechanism Authors: Shi Dong | Published: 2022-03-23 2022.03.23 2025.05.28 Literature Database
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10 2022.03.22 2025.05.28 Literature Database
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02 2022.03.22 2025.05.28 Literature Database
FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic Authors: Sankha Das | Published: 2022-03-21 2022.03.21 2025.05.28 Literature Database