Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
CNN vs ELM for Image-Based Malware Classification Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24 PE Malware ClassificationOptimization MethodsImage Feature Extraction 2021.03.24 2025.05.28 Literature Database
Detecting Phishing Sites — An Overview Authors: P. Kalaharsha, B. M. Mehtre | Published: 2021-03-23 | Updated: 2021-04-06 URL-based DetectionPhishingDetection Rate of Phishing Attacks 2021.03.23 2025.05.28 Literature Database
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23 Multi-output ModelVulnerability detectionevaluation metrics 2021.03.23 2025.05.28 Literature Database
Security of Healthcare Data Using Blockchains: A Survey Authors: Mayank Pandey, Rachit Agarwal, Sandeep K. Shukla, Nishchal K. Verma | Published: 2021-03-23 Data Protection MethodBlockchain TechnologyTypes of Medical Data 2021.03.23 2025.05.28 Literature Database
Anomaly Detection using Principles of Human Perception Authors: Nassir Mohammad | Published: 2021-03-23 | Updated: 2022-05-13 Data Extraction and AnalysisAnomaly Detection AlgorithmStatistical Methods 2021.03.23 2025.05.28 Literature Database
Federated Quantum Machine Learning Authors: Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2021-03-22 Deep Reinforcement LearningFederated LearningQuantum Neural Network 2021.03.22 2025.05.28 Literature Database
Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21 CybersecurityData DependencyQuantification of Uncertainty 2021.03.21 2025.05.28 Literature Database
Automated Software Vulnerability Assessment with Concept Drift Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21 Performance EvaluationConcept DriftVulnerability Analysis 2021.03.21 2025.05.28 Literature Database