Literature Database

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
Watermarking
Data Extraction and Analysis
Information Security

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10
Data Extraction and Analysis
Machine Learning Framework
Vulnerability Management

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10
Poisoning Attack
Machine Learning Framework
Communication Efficiency

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09
Data Extraction and Analysis
Privacy Management
Computational Efficiency

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09
Performance Evaluation Metrics
Attack Detection
Machine Learning Application

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03
Data Extraction and Analysis
Device Identification Method
Resource Usage Analysis

Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification

Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17
Uncertainty Assessment
Adversarial Attack Methods
Deep Learning Method

Optimizing Information Loss Towards Robust Neural Networks

Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29
Information-Theoretic Approach
Adversarial Example
Adversarial Attack Methods

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification

Authors: Wenjun Qiu, David Lie | Published: 2020-08-07
Active Learning
Data Extraction and Analysis
Privacy Assessment

Stronger and Faster Wasserstein Adversarial Attacks

Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06
Watermarking
Adversarial Learning
Adversarial attack