Extracted BERT Model Leaks More Information than You Think! Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31 Security AnalysisPrivacy Risk ManagementMembership Inference 2022.10.21 2025.05.28 Literature Database
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2 Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30 Security AnalysisData Privacy AssessmentPrivacy Risk Management 2022.10.17 2025.05.28 Literature Database
New Secure Sparse Inner Product with Applications to Machine Learning Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16 Security AnalysisCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database
IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19 Security AnalysisExpert Opinion CollectionFeature Importance Analysis 2022.07.19 2025.05.28 Literature Database
Security and Safety Aspects of AI in Industry Applications Authors: Hans Dermot Doran | Published: 2022-07-16 Security AnalysisTraining ProtocolModel Architecture 2022.07.16 2025.05.28 Literature Database
When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16 Security AnalysisData Selection StrategyClassification Pattern Analysis 2022.06.16 2025.05.28 Literature Database
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC Authors: Stefan More, Lukas Alber | Published: 2022-06-15 Access ControlSecurity AnalysisData Selection Strategy 2022.06.15 2025.05.28 Literature Database
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11 Security AnalysisData CollectionDeep Transfer Learning 2022.04.11 2025.05.28 Literature Database