Literature Database

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06
ML-Based IDS
Cyber Threat
Malware Detection

Statistical Privacy Guarantees of Machine Learning Preprocessing Techniques

Authors: Ashly Lau, Jonathan Passerat-Palmbach | Published: 2021-09-06
Data Generation
Privacy Assessment
Statistical Hypothesis Testing

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain

Authors: Richard Brown, Gueltoum Bendiab, Stavros Shiaeles, Bogdan Ghita | Published: 2021-09-06
Blockchain Integration
User Authentication System
Face Recognition System

Detection of Insider Threats using Artificial Intelligence and Visualisation

Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06
Cyber Threat
User Behavior Analysis
Log Analysis Method

Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

Authors: Aryan Verma | Published: 2021-09-06
Algorithm
Model Protection Methods
Encryption Technology

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05
Algorithm
Distributed Learning
Machine Learning Method

Predicting Process Name from Network Data

Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03
Cyber Threat
Fundamentals of Machine Learning
Defense Mechanism

CrypTen: Secure Multi-Party Computation Meets Machine Learning

Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15
Membership Inference
Machine Learning Method
Computational Efficiency

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03
Data Contamination Detection
Backdoor Attack
Adversarial Example

Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange

Authors: Pengcheng Xia, Haoyu wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Published: 2021-09-01 | Updated: 2021-11-11
Phishing
Fraud Token Identification
Financial Intelligence