Algorithm Design

Multi-party Secure Broad Learning System for Privacy Preserving

Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22
Algorithm Design
Secure Communication Channel
Feature Extraction Method

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20
Algorithm Design
Feature Extraction Method
Evaluation Method

sqSGD: Locally Private and Communication Efficient Federated Learning

Authors: Yan Feng, Tao Xiong, Ruofan Wu, LingJuan Lv, Leilei Shi | Published: 2022-06-21 | Updated: 2022-06-22
LDP Mechanism
Algorithm Design
Efficiency of Distributed Learning

Adversarial Robustness is at Odds with Lazy Training

Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17
Algorithm Design
Adversarial Example
Adversarial Attack Detection

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
Algorithm Design
Trojan Detection
Machine Learning Method

Finding MNEMON: Reviving Memories of Node Embeddings

Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29
Algorithm Design
Dataset evaluation
evaluation metrics

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic | Published: 2022-04-14
Algorithm Design
Data Extraction and Analysis
Machine Learning Application

Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT

Authors: Liu Zhang, Zilong Wang | Published: 2022-04-13
Algorithm Design
Experimental Validation
evaluation metrics

Malware Analysis with Symbolic Execution and Graph Kernel

Authors: Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-12
Algorithm Design
Graph Kernel
Machine Learning Application

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05
Algorithm Design
Data Extraction and Analysis
evaluation metrics