Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks Authors: Zahir Alsulaimawi | Published: 2024-03-15 Scalability AnalysisSecurity AnalysisFederated Learning 2024.03.15 2025.05.27 Literature Database
Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code Authors: Cristina Improta | Published: 2024-03-11 Security AnalysisBackdoor AttackPoisoning 2024.03.11 2025.05.27 Literature Database
Transfer Learning for Security: Challenges and Future Directions Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01 Security AnalysisPoisoningTransfer Learning 2024.03.01 2025.05.27 Literature Database
A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14 CybersecuritySecurity AnalysisAdvancements in Medical IoT 2024.01.14 2025.05.27 Literature Database
Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12 CybersecuritySecurity AnalysisPhysical layer security 2024.01.12 2025.05.27 Literature Database
Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11 WatermarkingSecurity AnalysisWatermark Evaluation 2024.01.11 2025.05.27 Literature Database
BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13 Graph TransformationSecurity AnalysisProgram Analysis 2023.12.13 2025.05.28 Literature Database
Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16 Security AnalysisData Protection MethodPrivacy Protection Method 2023.12.10 2025.05.28 Literature Database
Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01 Security AnalysisThreat modelingWatermark Robustness 2023.12.01 2025.05.28 Literature Database
A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database