Literature Database

Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks

Authors: Amara Dinesh Kumar | Published: 2018-05-11
Data Preprocessing
Performance Evaluation Metrics
Deep Learning Model

Exploiting Unintended Feature Leakage in Collaborative Learning

Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01
Data Leakage
Membership Inference
Label Inference Attack

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09
Cybersecurity
Information Security
Attack Detection

Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices

Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07
Cybersecurity
Information Security
Deep Learning Model

Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach

Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12
Cybersecurity
Attack Detection
Robustness of Watermarking Techniques

PRADA: Protecting against DNN Model Stealing Attacks

Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31
Data Generation
Model Extraction Attack
Threat Model

Automatic Classification of Object Code Using Machine Learning

Authors: John Clemens | Published: 2018-05-06
Data-Driven Vulnerability Assessment
Program Analysis
Information Security

Classification of Epileptic EEG Signals by Wavelet based CFC

Authors: Amirmasoud Ahmadi, Mahsa Behroozi, Vahid Shalchyan, Mohammad Reza Daliri | Published: 2018-05-04
Performance Evaluation Metrics
Time Series Analysis
Robustness of Watermarking Techniques

RF-PUF: Enhancing IoT Security through Authentication of Wireless Nodes using In-situ Machine Learning

Authors: Baibhab Chatterjee, Debayan Das, Shovan Maity, Shreyas Sen | Published: 2018-05-03 | Updated: 2018-06-19
Device Authentication
Robustness of Watermarking Techniques
Communication System

What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks

Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03
Cybersecurity
Botnet Traffic
Attack Method