Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01 Security AnalysisThreat modelingWatermark Robustness 2023.12.01 2025.05.28 Literature Database
A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07 Security AnalysisDataset GenerationDeep Learning Method 2023.11.07 2025.05.28 Literature Database
Software Repositories and Machine Learning Research in Cyber Security Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01 Security AnalysisSoftware SecurityTopic Modeling 2023.11.01 2025.05.28 Literature Database
Security Challenges for Cloud or Fog Computing-Based AI Applications Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20 Edge ComputingSecurity AnalysisData Leakage 2023.10.30 2025.05.28 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Robust and Actively Secure Serverless Collaborative Learning Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25 Security AnalysisByzantine ResilienceComputational Efficiency 2023.10.25 2025.05.28 Literature Database
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Critical Path Prioritization Dashboard for Alert-driven Attack Graphs Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem | Published: 2023-10-19 Security AnalysisUser Experience EvaluationAttack Graph Generation 2023.10.19 2025.05.28 Literature Database