Literature Database

Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03
Data Collection
Machine Learning Method
Feature Selection Method

MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks

Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02
LSTM Model Performance Evaluation
Malware Detection
Machine Learning Method

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16
Graph Embedding
Graph Construction
Security Analysis

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09
Security label
Prompt Injection
Vulnerability detection

A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25
DNN IP Protection Method
Attack Detection
Adaptive Adversarial Training

Have it your way: Individualized Privacy Assignment for DP-SGD

Authors: Franziska Boenisch, Christopher Mühl, Adam Dziedzic, Roy Rinberg, Nicolas Papernot | Published: 2023-03-29 | Updated: 2024-01-19
Customization Method
Privacy Protection Method
Privacy Assessment

Protecting Federated Learning from Extreme Model Poisoning Attacks via Multidimensional Time Series Anomaly Detection

Authors: Edoardo Gabrielli, Dimitri Belli, Zoe Matrullo, Vittorio Miori, Gabriele Tolomei | Published: 2023-03-29 | Updated: 2024-12-02
Data Contamination Detection
Poisoning
Convergence Property

Targeted Adversarial Attacks on Wind Power Forecasts

Authors: René Heinrich, Christoph Scholz, Stephan Vogt, Malte Lehna | Published: 2023-03-29 | Updated: 2023-08-17
DNN IP Protection Method
Attack Pattern Extraction
Climate Data Collection

On the Query Complexity of Training Data Reconstruction in Private Learning

Authors: Prateeti Mukherjee, Satya Lokam | Published: 2023-03-29 | Updated: 2024-01-11
Privacy Protection Method
Privacy Analysis
Privacy Assessment

Oracle Counterpoint: Relationships between On-chain and Off-chain Market Data

Authors: Zhimeng Yang, Ariah Klages-Mundt, Lewis Gudgeon | Published: 2023-03-28 | Updated: 2023-07-27
Blockchain Economics
Transaction Profit and Performance
Transaction Flow