Improved Matrix Gaussian Mechanism for Differential Privacy Authors: Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang | Published: 2021-04-30 2021.04.30 2025.05.28 Literature Database
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27 2021.04.27 2025.05.28 Literature Database
Metamorphic Detection of Repackaged Malware Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27 2021.04.27 2025.05.28 Literature Database
Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27 2021.04.27 2025.05.28 Literature Database
Exploiting Explanations for Model Inversion Attacks Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14 2021.04.26 2025.05.28 Literature Database
Improving Botnet Detection with Recurrent Neural Network and Transfer Learning Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu, Jaegyoon Hahm | Published: 2021-04-26 2021.04.26 2025.05.28 Literature Database
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan | Published: 2021-04-26 2021.04.26 2025.05.28 Literature Database
Influence Based Defense Against Data Poisoning Attacks in Online Learning Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24 2021.04.24 2025.05.28 Literature Database
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27 2021.04.23 2025.05.28 Literature Database
Collaborative Information Sharing for ML-Based Threat Detection Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23 2021.04.23 2025.05.28 Literature Database