Literature Database

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Authors: Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella | Published: 2021-12-12
Machine Learning Algorithm
Machine Learning Technology
Feature Extraction Method

Malware Classification Using Static Disassembly and Machine Learning

Authors: Zhenshuo Chen, Eoin Brophy, Tomas Ward | Published: 2021-12-10
Multi-Class Classification
Feature Extraction Method
Static Analysis

On the Security & Privacy in Federated Learning

Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16
Backdoor Attack
Poisoning
Defense Method

Automated Side Channel Analysis of Media Software with Manifold Learning

Authors: Yuanyuan Yuan, Qi Pang, Shuai Wang | Published: 2021-12-09 | Updated: 2021-12-10
Data Generation
Privacy Violation
Medical Image Analysis

ESAFE: Enterprise Security and Forensics at Scale

Authors: Bernard McShea, Kevin Wright, Denley Lam, Steve Schmidt, Anna Choromanska, Devansh Bisla, Shihong Fang, Alireza Sarmadi, Prashanth Krishnamurthy, Farshad Khorrami | Published: 2021-12-08
Data-Driven Clustering
Challenges of Log Analysis
Threat modeling

Membership Inference Attacks From First Principles

Authors: Nicholas Carlini, Steve Chien, Milad Nasr, Shuang Song, Andreas Terzis, Florian Tramer | Published: 2021-12-07 | Updated: 2022-04-12
Privacy Risk Management
Membership Inference
Performance Evaluation Metrics

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

Authors: Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino | Published: 2021-12-07
UAV Security
Efficient Configuration Verification
Challenges in Flight Control

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06
Poisoning
Adversarial Example
Adversarial Attack Detection

Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data

Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06
Medical Monitoring System
Machine Learning Application
Machine Learning Method

When the Curious Abandon Honesty: Federated Learning Is Not Private

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12
Data Extraction and Analysis
Training Data Extraction Method
Poisoning