Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27 WatermarkingPhishing AttackVisual Similarity Detection 2022.04.27 2025.05.28 Literature Database
Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier Authors: Anupama Mishra | Published: 2022-04-27 CybersecurityModel DesignAttack Method 2022.04.27 2025.05.28 Literature Database
Federated Stochastic Primal-dual Learning with Differential Privacy Authors: Yiwei Li, Shuai Wang, Tsung-Hui Chang, Chong-Yung Chi | Published: 2022-04-26 Privacy Protection MethodConvergence AnalysisCommunication Efficiency 2022.04.26 2025.05.28 Literature Database
You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26 Privacy LeakageLoss FunctionAttackers and Malicious Devices 2022.04.26 2025.05.28 Literature Database
Towards Data-Free Model Stealing in a Hard Label Setting Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23 Attack Methods against DFLQuery DiversityMembership Inference 2022.04.23 2025.05.28 Literature Database
GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12 Data Contamination DetectionAnomaly Detection MethodVehicle Network Security 2022.04.23 2025.05.28 Literature Database
Towards Privacy-Preserving Neural Architecture Search Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22 Privacy Protection MethodPrivacy Enhancing TechnologyModel Design 2022.04.22 2025.05.28 Literature Database
Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21 Privacy Protection MethodFundamentals of Machine LearningAnomaly Detection Method 2022.04.21 2025.05.28 Literature Database
ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20 CybersecurityIntrusion Detection SystemAttention Mechanism 2022.04.20 2025.05.28 Literature Database
Backdooring Explainable Machine Learning Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20 Backdoor AttackAttack TypeExplainability 2022.04.20 2025.05.28 Literature Database