Literature Database

Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking

Authors: Francesco Restuccia, Salvatore D'Oro, Tommaso Melodia | Published: 2018-03-13 | Updated: 2018-06-11
IoT Security Challenges
Proactive Defense
Detection of Model Extraction Attacks

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Authors: Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols | Published: 2018-03-13
Data Generation Method
User Behavior Analysis
Machine Learning Framework

Automatic Detection of Online Jihadist Hate Speech

Authors: Tom De Smedt, Guy De Pauw, Pieter Van Ostaeyen | Published: 2018-03-13
Content Moderation
Profile Characteristic Analysis
User Behavior Analysis

Data Science Methodology for Cybersecurity Projects

Authors: Farhad Foroughi, Peter Luksch | Published: 2018-03-12
Data Science Methodology
Model Selection
User Behavior Analysis

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12
Malware Detection Method
Adversarial Attack Detection
Encryption Technology

BEBP: An Poisoning Method Against Machine Learning Based IDSs

Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11
Data Generation Method
Backdoor Attack
Detection of Poisonous Data

Combating Adversarial Attacks Using Sparse Representations

Authors: Soorya Gopalakrishnan, Zhinus Marzi, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-03-11 | Updated: 2018-07-13
Sparse Representation
Backdoor Detection
Adversarial Attack Detection

Variance Networks: When Expectation Does Not Meet Your Expectations

Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18
Bayesian Security
Adversarial Learning
Machine Learning Application

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09
Data Privacy Management
Privacy Enhancing Technology
Speech Recognition Process