Security Analysis

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07
Security Analysis
Hardware Security
Quantum Machine Learning

Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats

Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17
Characteristics of APT Attacks
Security Analysis
Anomaly Detection Method

Android Malware Category and Family Detection and Identification using Machine Learning

Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05
Security Analysis
Machine Learning
Machine Learning Technology

ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare

Authors: Ali Burak Ünal, Mete Akgün, Nico Pfeifer | Published: 2020-12-04
Security Analysis
Framework
Privacy Protection in Machine Learning

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
Content Moderation
Security Analysis
Adversarial Learning

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18
Clustering methods
Security Analysis
Threat Model

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13
Watermarking
Code Change Analysis
Security Analysis

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18
Watermarking
Security Analysis
Machine Learning Method

Efficient Sparse Secure Aggregation for Federated Learning

Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18
Security Analysis
Privacy Assessment
Computational Efficiency

Security and Machine Learning in the Real World

Authors: Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li | Published: 2020-07-13
Security Analysis
Attack Method
Adversarial Example