Literature Database

Performance Weighting for Robust Federated Learning Against Corrupted Sources

Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02
Data Contamination Detection
Poisoning
Federated Learning

Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning)

Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02
Hyperparameter Optimization
Poisoning
Model Performance Evaluation

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12
Attack Methods against DFL
Cyber Threat
Attack Type

Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks

Authors: Aline R. Ioste, Alan M. Durham, Marcelo Finger | Published: 2022-04-30
Distributed Learning
Convergence analysis
Experimental Validation

Symbolic analysis meets federated learning to enhance malware identifier

Authors: Khanh Huu The Dam, Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-29
Cybersecurity
Secure Aggregation
Malware Propagation Means

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29
Cyber Threat
Attack Type
Image Feature Extraction

An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks

Authors: Hiba Tabbaa, Samir Ifzarne, Imad Hafidi | Published: 2022-04-28
Online Learning
Network Node Configuration
Intrusion Detection System

Unlocking High-Accuracy Differentially Private Image Classification through Scale

Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16
Privacy Protection Method
Model Design
Computational Efficiency

TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum Phishing Scams Detection

Authors: Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, Gang Xiong | Published: 2022-04-28
Cybersecurity
Network Node Configuration
Phishing Attack

An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework

Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27
Cybersecurity
Phishing Attack
Attack Method