Towards Explainable Meta-Learning for DDoS Detection Authors: Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu | Published: 2022-04-05 | Updated: 2022-08-16 DDoS AttackML-Based IDSMachine Learning 2022.04.05 2025.05.28 Literature Database
Deep Image: A precious image based deep learning method for online malware detection in IoT Environment Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04 Dynamic Analysis MethodMachine LearningImage Feature Extraction 2022.04.04 2025.05.28 Literature Database
Towards Privacy-Preserving and Verifiable Federated Matrix Factorization Authors: Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao | Published: 2022-04-04 | Updated: 2022-06-11 Privacy Enhancing ProtocolDistributed LearningMulti-Party Computation 2022.04.04 2025.05.28 Literature Database
Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28 AlgorithmPrivacy Protection MechanismPrivacy Assessment 2022.04.04 2025.05.28 Literature Database
ScaleSFL: A Sharding Solution for Blockchain-Based Federated Learning Authors: Evan Madill, Ben Nguyen, Carson K. Leung, Sara Rouhani | Published: 2022-04-04 Scalability AnalysisSmart ContractDistributed Learning 2022.04.04 2025.05.28 Literature Database
Detecting In-vehicle Intrusion via Semi-supervised Learning-based Convolutional Adversarial Autoencoders Authors: Thien-Nu Hoang, Daehee Kim | Published: 2022-04-04 ML-Based IDSSelf-Supervised LearningVehicle Network Security 2022.04.04 2025.05.28 Literature Database
Byzantine-Robust Federated Linear Bandits Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03 AlgorithmPrivacy Protection MechanismDistributed Learning 2022.04.03 2025.05.28 Literature Database
Breaking the De-Pois Poisoning Defense Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03 Backdoor AttackPoisoningDefense Method 2022.04.03 2025.05.28 Literature Database
Towards Web Phishing Detection Limitations and Mitigation Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03 Website Cloning TechnologyNetwork Threat DetectionMachine Learning 2022.04.03 2025.05.28 Literature Database
Convolutional Neural Networks for Image Spam Detection Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02 Model ArchitectureMachine LearningImage Feature Extraction 2022.04.02 2025.05.28 Literature Database