Literature Database

SoK: Differential Privacy on Graph-Structured Data

Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17
Graph Privacy
Privacy Protection
Privacy Analysis

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16
Dataset evaluation
Vulnerability Attack Method
Evaluation Method

Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling

Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15
Dataset evaluation
Privacy Enhancing Technology
Semi-Supervised Learning

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17
Dataset evaluation
Performance Evaluation Metrics
Feature Selection Method

A Framework for Verifiable and Auditable Federated Anomaly Detection

Authors: Gabriele Santin, Inna Skarbovsky, Fabiana Fournier, Bruno Lepri | Published: 2022-03-15
Training Protocol
Privacy Enhancing Technology
Blockchain Integration

SmartValidator: A Framework for Automatic Identification and Classification of Cyber Threat Data

Authors: Chadni Islam, M. Ali Babar, Roland Croft, Helge Janicke | Published: 2022-03-15
Model Selection Method
Performance Evaluation Metrics
Threat Intelligence

RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14
Poisoning
Vulnerability Attack Method
Defense Method

The Right to be Forgotten in Federated Learning: An Efficient Realization with Rapid Retraining

Authors: Yi Liu, Lei Xu, Xingliang Yuan, Cong Wang, Bo Li | Published: 2022-03-14
Training Protocol
Privacy Enhancing Technology
Optimization Methods

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13
Dynamic Analysis
Cryptography
Feature Extraction Method

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13
Active Learning
Network Threat Detection
Performance Evaluation