SSGD: A safe and efficient method of gradient descent

Authors: Jinhuan Duan, Xianxian Li, Shiqi Gao, Jinyan Wang, Zili Zhong | Published: 2020-12-03 | Updated: 2021-04-26

FAT: Federated Adversarial Training

Authors: Giulio Zizzo, Ambrish Rawat, Mathieu Sinn, Beat Buesser | Published: 2020-12-03

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14

A Chatbot for Information Security

Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Authors: Joni Korpihalkola, Tuomo Sipola, Samir Puuska, Tero Kokkonen | Published: 2020-12-01 | Updated: 2021-11-02

Towards a Universal Features Set for IoT Botnet Attacks Detection

Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

Authors: Seira Hidano, Takao Murakami, Yusuke Kawamoto | Published: 2020-11-30 | Updated: 2021-04-23

Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01