Literature Database

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10
IoT Security Risks
Performance Evaluation
Machine Learning Method

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
Performance Evaluation
Attack Evaluation
Machine Learning Method

Online Malware Classification with System-Wide System Calls in Cloud IaaS

Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09
Malware Classification
Malware Detection Method
Machine Learning Method

Robust Machine Learning for Malware Detection over Time

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09
Malware Detection Method
Robustness Evaluation
Machine Learning Method

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08
Malware Detection Method
Performance Evaluation
Communication Analysis

Quantization enabled Privacy Protection in Decentralized Stochastic Optimization

Authors: Yongqiang Wang, Tamer Basar | Published: 2022-08-07
Data Privacy Assessment
Convergence Analysis
Quantization Method

Federated Adversarial Learning: A Framework with Convergence Analysis

Authors: Xiaoxiao Li, Zhao Song, Jiaming Yang | Published: 2022-08-07
Robustness Evaluation
Adaptive Adversarial Training
Weight Update Method

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01
Stability of Predictions
Performance Evaluation
Machine Learning Method

Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions

Authors: Ashish Rauniyar, Desta Haileselassie Hagos, Debesh Jha, Jan Erik Håkegård, Ulas Bagci, Danda B. Rawat, Vladimir Vlassov | Published: 2022-08-05 | Updated: 2023-10-29
Data Privacy Assessment
Advancements in Medical IoT
Medical Image Analysis

Lethal Dose Conjecture on Data Poisoning

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18
Robustness Evaluation
Classification Pattern Analysis
Machine Learning Method