Security Analysis

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
Graph Transformation
Security Analysis
Program Analysis

Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships

Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16
Security Analysis
Data Protection Method
Privacy Protection Method

Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis

Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01
Security Analysis
Threat modeling
Watermark Robustness

A Blockchain Solution for Collaborative Machine Learning over IoT

Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23
Security Analysis
Privacy Protection
Machine Learning Method

Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox

Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07
Security Analysis
Dataset Generation
Deep Learning Method

Software Repositories and Machine Learning Research in Cyber Security

Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01
Security Analysis
Software Security
Topic Modeling

Security Challenges for Cloud or Fog Computing-Based AI Applications

Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20
Edge Computing
Security Analysis
Data Leakage

Label Poisoning is All You Need

Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29
Security Analysis
Backdoor Attack
Classification of Malicious Actors

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
Security Analysis
Model Design
Adversarial Attack Detection

Robust and Actively Secure Serverless Collaborative Learning

Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25
Security Analysis
Byzantine Resilience
Computational Efficiency