Literature Database

Black-box Detection of Backdoor Attacks with Limited Information and Data

Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24
Backdoor Attack
Optimization Methods
Defense Mechanism

A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks

Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24
Optimization Methods
Vulnerability Assessment Method
Defense Mechanism

CNN vs ELM for Image-Based Malware Classification

Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24
PE Malware Classification
Optimization Methods
Image Feature Extraction

Detecting Phishing Sites — An Overview

Authors: P. Kalaharsha, B. M. Mehtre | Published: 2021-03-23 | Updated: 2021-04-06
URL-based Detection
Phishing
Detection Rate of Phishing Attacks

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23
Multi-output Model
Vulnerability detection
evaluation metrics

Security of Healthcare Data Using Blockchains: A Survey

Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma | Published: 2021-03-23
Data Protection Method
Blockchain Technology
Types of Medical Data

Anomaly Detection using Principles of Human Perception

Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13
Data Extraction and Analysis
Anomaly Detection Algorithm
Statistical Methods

Federated Quantum Machine Learning

Authors: Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2021-03-22
Deep Reinforcement Learning
Federated Learning
Quantum Neural Network

Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation

Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21
Cybersecurity
Data Dependency
Quantification of Uncertainty

Automated Software Vulnerability Assessment with Concept Drift

Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21
Performance Evaluation
Concept Drift
Vulnerability Analysis