Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 Security AnalysisThreat modelingVulnerability Mitigation Technique 2023.04.05 2025.05.28 Literature Database
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 Security AnalysisNetwork Threat DetectionEducational CTF 2023.04.03 2025.05.28 Literature Database
Graph Mining for Cybersecurity: A Survey Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16 Graph EmbeddingGraph ConstructionSecurity Analysis 2023.04.02 2025.05.28 Literature Database
Extracted BERT Model Leaks More Information than You Think! Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31 Security AnalysisPrivacy Risk ManagementMembership Inference 2022.10.21 2025.05.28 Literature Database
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
Attribute Inference Attacks in Online Multiplayer Video Games: a Case Study on Dota2 Authors: Pier Paolo Tricomi, Lisa Facciolo, Giovanni Apruzzese, Mauro Conti | Published: 2022-10-17 | Updated: 2023-04-30 Security AnalysisData Privacy AssessmentPrivacy Risk Management 2022.10.17 2025.05.28 Literature Database
New Secure Sparse Inner Product with Applications to Machine Learning Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16 Security AnalysisCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database