Literature Database

FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic

Authors: Sankha Das | Published: 2022-03-21
Model Communication
Intrusion Detection System
Generative Adversarial Network

Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap

Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21
Training Data Generation
Analysis of Detection Methods
Machine Learning

RareGAN: Generating Samples for Rare Classes

Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20
Active Learning
Trade-off Analysis
Training Data Generation

The Dark Side: Security Concerns in Machine Learning for EDA

Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20
Training Data Generation
Privacy Risk Management
Malicious Client

On Robust Prefix-Tuning for Text Classification

Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19
XAI (Explainable AI)
Trade-off Analysis
Parameter Tuning

Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18
Privacy Assessment
Risk Assessment Method
Reinforcement Learning Algorithm

Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18
DDoS Attack
Energy-Based Model
Attack Method

AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks

Authors: Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili | Published: 2022-03-18
DDoS Attack
IoT Cybersecurity
Intrusion Detection System

Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network

Authors: Hai N. Nguyen, Guevara Noubir | Published: 2022-03-18
Performance Evaluation
Wireless Channel Detection
Communication Model

Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study

Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17
Data Management System
Performance Evaluation
Machine Learning Algorithm