Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19 PoisoningMembership InferenceVulnerability Management 2023.01.18 2025.05.28 Literature Database
Using Topological Data Analysis to classify Encrypted Bits Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18 Algorithm DesignMachine LearningImage Forensics 2023.01.18 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 Data CollectionProgram AnalysisMachine Learning Technology 2023.01.17 2025.05.28 Literature Database
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15 Performance Evaluation MetricsMachine Learning TechnologyFeature Selection Method 2023.01.15 2025.05.28 Literature Database
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12 Data CollectionUnknown Attack DetectionMachine Learning Method 2023.01.12 2025.05.28 Literature Database
SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11 DNN IP Protection MethodAdversarial Attack MethodsStructural Attack 2023.01.11 2025.05.28 Literature Database
Chatbots in a Honeypot World Authors: Forrest McKee, David Noever | Published: 2023-01-10 Cyber AttackHoneypot TechnologyProgram Analysis 2023.01.10 2025.05.28 Literature Database
Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12 DNN IP Protection MethodPrivacy Enhancing TechnologyPoisoning 2023.01.09 2025.05.28 Literature Database
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Authors: Arshiya Khan, Chase Cotton | Published: 2023-01-09 IoT Device IdentificationPrompt InjectionMalicious Package Detection 2023.01.09 2025.05.28 Literature Database