Review on Classification Techniques used in Biophysiological Stress Monitoring Authors: Talha Iqbal, Adnan Elahi, Atif Shahzad, William Wijns | Published: 2022-10-28 Stress ManagementModel Design and AccuracyOptimization Methods 2022.10.28 2025.05.28 Literature Database
Learning Failure-Inducing Models for Testing Software-Defined Networks Authors: Raphaël Ollando, Seung Yeob Shin, Lionel C. Briand | Published: 2022-10-27 | Updated: 2024-01-08 Class ImbalancePenetration Testing MethodsDynamic Vulnerability Management 2022.10.27 2025.05.28 Literature Database
Isometric 3D Adversarial Examples in the Physical World Authors: Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao | Published: 2022-10-27 Adversarial TrainingOptimization MethodsGenerative Adversarial Network 2022.10.27 2025.05.28 Literature Database
The Inconvenient Truths of Ground Truth for Binary Analysis Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26 Program AnalysisOptimization MethodsFunction Definition 2022.10.26 2025.05.28 Literature Database
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26 Program AnalysisDynamic AnalysisDynamic Vulnerability Management 2022.10.26 2025.05.28 Literature Database
Multi-view Representation Learning from Malware to Defend Against Adversarial Variants Authors: James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen | Published: 2022-10-25 WatermarkingDynamic AnalysisAdversarial Training 2022.10.25 2025.05.28 Literature Database
Synthetic Text Generation with Differential Privacy: A Simple and Practical Recipe Authors: Xiang Yue, Huseyin A. Inan, Xuechen Li, Girish Kumar, Julia McAnallen, Hoda Shajari, Huan Sun, David Levitan, Robert Sim | Published: 2022-10-25 | Updated: 2023-07-18 Data Privacy AssessmentData Protection MethodPrivacy Protection 2022.10.25 2025.05.28 Literature Database
A White-Box Adversarial Attack Against a Digital Twin Authors: Wilson Patterson, Ivan Fernandez, Subash Neupane, Milan Parmar, Sudip Mittal, Shahram Rahimi | Published: 2022-10-25 Cyber AttackAdversarial TrainingAnomaly Detection Method 2022.10.25 2025.05.28 Literature Database
Analyzing Privacy Leakage in Machine Learning via Multiple Hypothesis Testing: A Lesson From Fano Authors: Chuan Guo, Alexandre Sablayrolles, Maziar Sanjabi | Published: 2022-10-24 | Updated: 2023-08-10 Privacy ProtectionMembership InferenceStatistical Hypothesis Testing 2022.10.24 2025.05.28 Literature Database
Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors using Machine Learning Authors: Ying Yuan, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-24 | Updated: 2023-10-12 PoisoningMalicious Website DetectionAttack Scenario Analysis 2022.10.24 2025.05.28 Literature Database