Literature Database

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22
Poisoning
Adversarial Learning
Defense Method

Towards Malicious address identification in Bitcoin

Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2021-12-22
Data Preprocessing
Fraudulent Transaction
Time-Related Features

Distributed Machine Learning and the Semblance of Trust

Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21
Data Management System
Privacy Violation
Poisoning

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21
Event Trace Analysis
Membership Inference
Threat Model

Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma | Published: 2021-12-21 | Updated: 2022-08-25
Blockchain Technology
Crime Detection
Communication Efficiency

A Theoretical View of Linear Backpropagation and Its Convergence

Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10
Model Design
Convergence Analysis
Defense Method

Vulnerability Analysis of the Android Kernel

Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20
Membership Inference
Performance Evaluation
Vulnerability Prediction

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey

Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19
Backdoor Attack
Privacy Risk Management
Poisoning

ML Supported Predictions for SAT Solvers Performance

Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17
Model Design
Performance Evaluation Metrics
Machine Learning Method

Deep Bayesian Learning for Car Hacking Detection

Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17
Machine Learning Method
Deep Learning Method
Vulnerabilities in Autonomous Driving Technology