BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13 Graph TransformationSecurity AnalysisProgram Analysis 2023.12.13 2025.05.28 Literature Database
Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16 Security AnalysisData Protection MethodPrivacy Protection Method 2023.12.10 2025.05.28 Literature Database
Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01 Security AnalysisThreat modelingWatermark Robustness 2023.12.01 2025.05.28 Literature Database
A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07 Security AnalysisDataset GenerationDeep Learning Method 2023.11.07 2025.05.28 Literature Database
Software Repositories and Machine Learning Research in Cyber Security Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01 Security AnalysisSoftware SecurityTopic Modeling 2023.11.01 2025.05.28 Literature Database
Security Challenges for Cloud or Fog Computing-Based AI Applications Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20 Edge ComputingSecurity AnalysisData Leakage 2023.10.30 2025.05.28 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Robust and Actively Secure Serverless Collaborative Learning Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25 Security AnalysisByzantine ResilienceComputational Efficiency 2023.10.25 2025.05.28 Literature Database