Machine Learning Aided Static Malware Analysis: A Survey and Tutorial Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03 API CallsDataset for Malware ClassificationMachine Learning Method 2018.08.03 2025.05.28 Literature Database
Cyber Threat Intelligence : Challenges and Opportunities Authors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi | Published: 2018-08-03 Cyber Threat IntelligenceMalware ClassificationRole of Artificial Intelligence 2018.08.03 2025.05.28 Literature Database
Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices Authors: Yingyuan Yang, Xueli Huang, Yanhui Guo, Jinyuan Stella Sun | Published: 2018-08-02 | Updated: 2021-04-15 Class Mapping MethodProfile MatchingModel Design and Accuracy 2018.08.02 2025.05.28 Literature Database
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06 Membership InferenceModel Extraction AttackModel Evaluation 2018.08.01 2025.05.28 Literature Database
Tackling Android Stego Apps in the Wild Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01 Data LeakageMachine Learning ApplicationImage Processing 2018.08.01 2025.05.28 Literature Database
Cognitive Techniques for Early Detection of Cybersecurity Events Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01 Cyber Threat IntelligenceAttack Scenario AnalysisKnowledge Extraction Method 2018.08.01 2025.05.28 Literature Database
Subsampled Rényi Differential Privacy and Analytical Moments Accountant Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04 Characteristics of RDPPrivacy AssessmentDifferential Privacy 2018.07.31 2025.05.28 Literature Database
Security and Privacy Issues in Deep Learning Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10 Differential PrivacyAdversarial Example DetectionAdversarial attack 2018.07.31 2025.05.28 Literature Database
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29 IoT CybersecurityModel Extraction AttackDetection of Model Extraction Attacks 2018.07.29 2025.05.28 Literature Database
Rob-GAN: Generator, Discriminator, and Adversarial Attacker Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15 Robustness EvaluationAdversarial LearningAdversarial attack 2018.07.27 2025.05.28 Literature Database