Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 Cyber ThreatSpam DetectionPerformance Evaluation 2022.06.06 2025.05.28 Literature Database
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 Cyber ThreatHybrid AnalysisDynamic Analysis 2022.06.04 2025.05.28 Literature Database
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 Evaluation Methods for PUFSecurity AssuranceTraining Protocol 2022.06.02 2025.05.28 Literature Database
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 Attack Methods against DFLPrivacy AssessmentPoisoning 2022.06.01 2025.05.28 Literature Database
Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20 Training ProtocolPrivacy AssessmentPoisoning 2022.06.01 2025.05.28 Literature Database
Differentially Private Shapley Values for Data Evaluation Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01 Sample ComplexityPrivacy AssessmentLoss Term 2022.06.01 2025.05.28 Literature Database
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 Malware Detection MethodTransaction Profit and PerformanceFunding 2022.06.01 2025.05.28 Literature Database
Privacy for Free: How does Dataset Condensation Help Privacy? Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01 Data Management SystemPrivacy AssessmentLoss Term 2022.06.01 2025.05.28 Literature Database
To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints? Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31 Data Management SystemReduction of Communication CostsCommunication Model 2022.05.31 2025.05.28 Literature Database
Private Federated Submodel Learning with Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31 Data Management SystemPrivacy AssessmentReduction of Communication Costs 2022.05.31 2025.05.28 Literature Database