Literature Database

Dissecting Malware in the Wild

Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04
Backdoor Attack
Malware Detection Method
Adversarial attack

Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh | Published: 2021-11-27
Malware Detection Method
Reinforcement Learning
Deep Reinforcement Learning

The Geometry of Adversarial Training in Binary Classification

Authors: Leon Bungert, Nicolás García Trillos, Ryan Murray | Published: 2021-11-26 | Updated: 2022-08-01
Adversarial attack
Regularization
Nonlocal Variational Regularization

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files

Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24
Dataset evaluation
Data Integrity Constraints
Machine Learning Application

xFuzz: Machine Learning Guided Cross-Contract Fuzzing

Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30
Smart Contract
Vulnerability Management
Static Analysis

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23
Reinforcement Learning
Adversarial attack
Deep Reinforcement Learning

Node-Level Differentially Private Graph Neural Networks

Authors: Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, Prateek Jain | Published: 2021-11-23 | Updated: 2022-08-26
DP-SGD
Graph Representation Learning
Privacy Risk Management

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23
Dataset evaluation
Model Selection Method
Risk Assessment Method

A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22
Malware Detection Method
Adversarial attack
Malware Detection with Limited Samples

NTD: Non-Transferability Enabled Backdoor Detection

Authors: Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott | Published: 2021-11-22
Traffic Sign Classification
Non-Transferable Detection
Face Recognition System