SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.28 Literature Database
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22 Blockchain TechnologyMachine Learning MethodLinear Model 2021.01.07 2025.05.28 Literature Database
FLAME: Taming Backdoors in Federated Learning (Extended Version 1) Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider | Published: 2021-01-06 | Updated: 2023-08-05 Backdoor Attack TechniquesPoisoningDefense Effectiveness Analysis 2021.01.06 2025.05.28 Literature Database
Local Competition and Stochasticity for Adversarial Robustness in Deep Learning Authors: Konstantinos P. Panousis, Sotirios Chatzis, Antonios Alexos, Sergios Theodoridis | Published: 2021-01-04 | Updated: 2021-03-29 PoisoningModel Performance EvaluationDeep Learning Method 2021.01.04 2025.05.28 Literature Database
Active Learning Under Malicious Mislabeling and Poisoning Attacks Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02 Backdoor AttackPoisoningPerformance Evaluation 2021.01.01 2025.05.28 Literature Database
Stack-based Buffer Overflow Detection using Recurrent Neural Networks Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30 Data Generation MethodMachine Learning MethodResearch Methodology 2020.12.30 2025.05.28 Literature Database
With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database
Phishing Detection through Email Embeddings Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28 Email SecurityMachine Learning AlgorithmFeature Engineering 2020.12.28 2025.05.28 Literature Database
Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection Authors: Mir Hassan, Chen Jincai, Adnan Iftekhar, Adnan Shehzad, Xiaohui Cui | Published: 2020-12-28 Data Management SystemInformation Leakage AnalysisDefense Mechanism 2020.12.28 2025.05.28 Literature Database
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach Authors: Benjamin M. Ampel | Published: 2020-12-26 Challenges of Data LabelingMachine Learning AlgorithmResearch Methodology 2020.12.26 2025.05.28 Literature Database