Security Analysis

Extracted BERT Model Leaks More Information than You Think!

Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31
Security Analysis
Privacy Risk Management
Membership Inference

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07
Security Analysis
Privacy Risk Management
Computational Efficiency

Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2

Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30
Security Analysis
Data Privacy Assessment
Privacy Risk Management

New Secure Sparse Inner Product with Applications to Machine Learning

Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16
Security Analysis
Cryptography
Computational Efficiency

Classification of Web Phishing Kits for early detection by platform providers

Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15
Security Analysis
Malicious Website Detection
Machine Learning Technology

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19
Security Analysis
Expert Opinion Collection
Feature Importance Analysis

Security and Safety Aspects of AI in Industry Applications

Authors: Hans Dermot Doran | Published: 2022-07-16
Security Analysis
Training Protocol
Model Architecture

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
Security Analysis
Data Selection Strategy
Classification Pattern Analysis

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15
Access Control
Security Analysis
Data Selection Strategy

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11
Security Analysis
Data Collection
Deep Transfer Learning