Literature Database

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19
Poisoning
Membership Inference
Vulnerability Management

Using Topological Data Analysis to classify Encrypted Bits

Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18
Algorithm Design
Machine Learning
Image Forensics

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17
Privacy Enhancing Technology
Model Performance Evaluation
Feature Importance Analysis

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17
Data Collection
Program Analysis
Machine Learning Technology

A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis

Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15
Performance Evaluation Metrics
Machine Learning Technology
Feature Selection Method

Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms

Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12
Data Collection
Unknown Attack Detection
Machine Learning Method

SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning

Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11
DNN IP Protection Method
Adversarial Attack Methods
Structural Attack

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
Cyber Attack
Honeypot Technology
Program Analysis

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12
DNN IP Protection Method
Privacy Enhancing Technology
Poisoning

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning

Authors: Arshiya Khan, Chase Cotton | Published: 2023-01-09
IoT Device Identification
Prompt Injection
Malicious Package Detection