Literature Database

Understanding the Security of Deepfake Detection

Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06
Poisoning
Deep Learning Technology
Face Recognition System

Machine Learning for Fraud Detection in E-Commerce: A Research Agenda

Authors: Niek Tax, Kees Jan de Vries, Mathijs de Jong, Nikoleta Dosoula, Bram van den Akker, Jon Smith, Olivier Thuong, Lucas Bernardi | Published: 2021-07-05
Active Learning
Machine Learning Technology
Crime Detection

When and How to Fool Explainable Models (and Humans) with Adversarial Examples

Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2021-07-05 | Updated: 2023-07-07
Model Interpretability
Adversarial Example
Adversarial attack

Android Malware Category and Family Detection and Identification using Machine Learning

Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05
Security Analysis
Machine Learning
Machine Learning Technology

Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities

Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23
Attack Evaluation
Machine Learning Application
Machine Learning Technology

Optimizing the Numbers of Queries and Replies in Federated Learning with Differential Privacy

Authors: Yipeng Zhou, Xuezheng Liu, Yao Fu, Di Wu, Chao Li, Shui Yu | Published: 2021-07-05
Privacy Enhancing Protocol
Privacy Analysis
Federated Learning

Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai | Published: 2021-07-05 | Updated: 2021-10-03
Cybersecurity
Membership Inference
Threat modeling

Towards Scheduling Federated Deep Learning using Meta-Gradients for Inter-Hospital Learning

Authors: Rasheed el-Bouri, Tingting Zhu, David A. Clifton | Published: 2021-07-04
Scheduling Method
Deep Learning Technology
Federated Learning

Machine Learning for Malware Evolution Detection

Authors: Lolitha Sresta Tupadha, Mark Stamp | Published: 2021-07-04
Malware Evolution
Machine Learning Application
Machine Learning Technology

Auxiliary-Classifier GAN for Malware Analysis

Authors: Rakesh Nagaraju, Mark Stamp | Published: 2021-07-04
Data Generation
Malware Evolution
Deep Learning Method