Literature Database

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03
API Calls
Dataset for Malware Classification
Machine Learning Method

Cyber Threat Intelligence : Challenges and Opportunities

Authors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi | Published: 2018-08-03
Cyber Threat Intelligence
Malware Classification
Role of Artificial Intelligence

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Authors: Yingyuan Yang, Xueli Huang, Yanhui Guo, Jinyuan Stella Sun | Published: 2018-08-02 | Updated: 2021-04-15
Class Mapping Method
Profile Matching
Model Design and Accuracy

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06
Membership Inference
Model Extraction Attack
Model Evaluation

Tackling Android Stego Apps in the Wild

Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01
Data Leakage
Machine Learning Application
Image Processing

Cognitive Techniques for Early Detection of Cybersecurity Events

Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01
Cyber Threat Intelligence
Attack Scenario Analysis
Knowledge Extraction Method

Subsampled Rényi Differential Privacy and Analytical Moments Accountant

Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04
Characteristics of RDP
Privacy Assessment
Differential Privacy

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10
Differential Privacy
Adversarial Example Detection
Adversarial attack

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29
IoT Cybersecurity
Model Extraction Attack
Detection of Model Extraction Attacks

Rob-GAN: Generator, Discriminator, and Adversarial Attacker

Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15
Robustness Evaluation
Adversarial Learning
Adversarial attack