SoK: Differential Privacy on Graph-Structured Data Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17 Graph PrivacyPrivacy ProtectionPrivacy Analysis 2022.03.17 2025.05.28 Literature Database
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15 Dataset evaluationPrivacy Enhancing TechnologySemi-Supervised Learning 2022.03.15 2025.05.28 Literature Database
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17 Dataset evaluationPerformance Evaluation MetricsFeature Selection Method 2022.03.15 2025.05.28 Literature Database
A Framework for Verifiable and Auditable Federated Anomaly Detection Authors: Gabriele Santin, Inna Skarbovsky, Fabiana Fournier, Bruno Lepri | Published: 2022-03-15 Training ProtocolPrivacy Enhancing TechnologyBlockchain Integration 2022.03.15 2025.05.28 Literature Database
SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke | Published: 2022-03-15 Model Selection MethodPerformance Evaluation MetricsThreat Intelligence 2022.03.15 2025.05.28 Literature Database
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14 PoisoningVulnerability Attack MethodDefense Method 2022.03.14 2025.05.28 Literature Database
The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14 Training ProtocolPrivacy Enhancing TechnologyOptimization Methods 2022.03.14 2025.05.28 Literature Database
Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13 Dynamic AnalysisCryptographyFeature Extraction Method 2022.03.13 2025.05.28 Literature Database
Generating Practical Adversarial Network Traffic Flows Using NIDSGAN Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13 Active LearningNetwork Threat DetectionPerformance Evaluation 2022.03.13 2025.05.28 Literature Database