Literature Database

Improved Matrix Gaussian Mechanism for Differential Privacy

Authors: Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang | Published: 2021-04-30
Data Privacy Assessment
Privacy Protection
Statistical Methods

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27
ML-Based IDS
Data Preprocessing
Model Performance Evaluation

Metamorphic Detection of Repackaged Malware

Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27
Malware Detection Method
Feature Interdependence
Feature Extraction Method

Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity

Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27
Data Privacy Assessment
Privacy Protection
Model Performance Evaluation

Exploiting Explanations for Model Inversion Attacks

Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14
XAI (Explainable AI)
Privacy Technique
Model Inversion

Improving Botnet Detection with Recurrent Neural Network and Transfer Learning

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu, Jaegyoon Hahm | Published: 2021-04-26
Poisoning
Botnet Detection
Transfer Learning

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan | Published: 2021-04-26
Poisoning
Multi-Class Classification
Adversarial Example Detection

Influence Based Defense Against Data Poisoning Attacks in Online Learning

Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24
Data Protection Method
Poisoning
Defense Mechanism

Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27
Automation of Cybersecurity
Model Design
Machine Learning Technology

Collaborative Information Sharing for ML-Based Threat Detection

Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23
Privacy Protection
Machine Learning Technology
Threat Model