Security Analysis

Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks

Authors: Zahir Alsulaimawi | Published: 2024-03-15
Scalability Analysis
Security Analysis
Federated Learning

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
Security Analysis
Backdoor Attack
Poisoning

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01
Security Analysis
Poisoning
Transfer Learning

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14
Cybersecurity
Security Analysis
Advancements in Medical IoT

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12
Cybersecurity
Security Analysis
Physical layer security

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning

Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11
Watermarking
Security Analysis
Watermark Evaluation

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
Graph Transformation
Security Analysis
Program Analysis

Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships

Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16
Security Analysis
Data Protection Method
Privacy Protection Method

Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis

Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01
Security Analysis
Threat modeling
Watermark Robustness

A Blockchain Solution for Collaborative Machine Learning over IoT

Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23
Security Analysis
Privacy Protection
Machine Learning Method