Literature Database

Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection

Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27
Watermarking
Phishing Attack
Visual Similarity Detection

Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier

Authors: Anupama Mishra | Published: 2022-04-27
Cybersecurity
Model Design
Attack Method

Federated Stochastic Primal-dual Learning with Differential Privacy

Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26
Privacy Protection Method
Convergence Analysis
Communication Efficiency

You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas

Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26
Privacy Leakage
Loss Function
Attackers and Malicious Devices

Towards Data-Free Model Stealing in a Hard Label Setting

Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23
Attack Methods against DFL
Query Diversity
Membership Inference

GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV

Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12
Data Contamination Detection
Anomaly Detection Method
Vehicle Network Security

Towards Privacy-Preserving Neural Architecture Search

Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22
Privacy Protection Method
Privacy Enhancing Technology
Model Design

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21
Privacy Protection Method
Fundamentals of Machine Learning
Anomaly Detection Method

ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System

Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20
Cybersecurity
Intrusion Detection System
Attention Mechanism

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability