Robust Black-box Watermarking for Deep NeuralNetwork using Inverse Document Frequency Authors: Mohammad Mehdi Yadollahi, Farzaneh Shoeleh, Sajjad Dadkhah, Ali A. Ghorbani | Published: 2021-03-09 Model Performance EvaluationDeep Learning MethodWatermark Evaluation 2021.03.09 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Word Embedding Techniques for Malware Evolution Detection Authors: Sunhera Paul, Mark Stamp | Published: 2021-03-07 PE Malware ClassificationTime Window AnalysisEvolutionary Score Calculation 2021.03.07 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 Performance EvaluationMachine Learning ApplicationEvaluation Method 2021.03.07 2025.05.28 Literature Database
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07 Attack Scenario AnalysisAdversarial Example DetectionAdversarial Learning 2021.03.07 2025.05.28 Literature Database
T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11 Text Perturbation MethodBackdoor DetectionAttack Method 2021.03.07 2025.05.28 Literature Database
Utilising Flow Aggregation to Classify Benign Imitating Attacks Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06 Flow Aggregation MethodAttack Detectionevaluation metrics 2021.03.06 2025.05.28 Literature Database
MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05 WatermarkingMulti-Class ClassificationDeep Learning Technology 2021.03.05 2025.05.28 Literature Database
A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05 Watermarking Settings for Medical DataAttack MethodThreat modeling 2021.03.05 2025.05.28 Literature Database
Efficient Encrypted Inference on Ensembles of Decision Trees Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05 Performance EvaluationReal-Time InferenceDeep Learning Technology 2021.03.05 2025.05.28 Literature Database