Literature Database

Towards Explainable Meta-Learning for DDoS Detection

Authors: Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu | Published: 2022-04-05 | Updated: 2022-08-16
DDoS Attack
ML-Based IDS
Machine Learning

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04
Dynamic Analysis Method
Machine Learning
Image Feature Extraction

Towards Privacy-Preserving and Verifiable Federated Matrix Factorization

Authors: Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao | Published: 2022-04-04 | Updated: 2022-06-11
Privacy Enhancing Protocol
Distributed Learning
Multi-Party Computation

Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization

Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28
Algorithm
Privacy Protection Mechanism
Privacy Assessment

ScaleSFL: A Sharding Solution for Blockchain-Based Federated Learning

Authors: Evan Madill, Ben Nguyen, Carson K. Leung, Sara Rouhani | Published: 2022-04-04
Scalability Analysis
Smart Contract
Distributed Learning

Detecting In-vehicle Intrusion via Semi-supervised Learning-based Convolutional Adversarial Autoencoders

Authors: Thien-Nu Hoang, Daehee Kim | Published: 2022-04-04
ML-Based IDS
Self-Supervised Learning
Vehicle Network Security

Byzantine-Robust Federated Linear Bandits

Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03
Algorithm
Privacy Protection Mechanism
Distributed Learning

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method

Towards Web Phishing Detection Limitations and Mitigation

Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03
Website Cloning Technology
Network Threat Detection
Machine Learning

Convolutional Neural Networks for Image Spam Detection

Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02
Model Architecture
Machine Learning
Image Feature Extraction