Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2023-10-14 Dataset GenerationTrojan DetectionQuantification of Uncertainty 2023.10.14 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 Dataset GenerationModel Extraction AttackAdversarial Example 2023.08.09 2025.05.28 Literature Database
Metadata-based Malware Detection on Android using Machine Learning Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17 Dataset GenerationMalware Detection MethodMachine Learning Method 2023.07.17 2025.05.28 Literature Database
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17 Dataset GenerationMachine Learning TechnologyThreat modeling 2023.07.17 2025.05.28 Literature Database
Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15 Dataset GenerationTime Window AnalysisMachine Learning Method 2023.07.15 2025.05.28 Literature Database
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild Authors: Giuseppe Siracusano, Davide Sanvito, Roberto Gonzalez, Manikantan Srinivasan, Sivakaman Kamatchi, Wataru Takahashi, Masaru Kawakita, Takahiro Kakumaru, Roberto Bifulco | Published: 2023-07-14 Dataset GenerationPrompt InjectionAttack Pattern Extraction 2023.07.14 2025.05.28 Literature Database
Student Assessment in Cybersecurity Training Automated by Pattern Mining and Clustering Authors: Valdemar Švábenský, Jan Vykopal, Pavel Čeleda, Kristián Tkáčik, Daniel Popovič | Published: 2023-07-13 Security AnalysisDataset GenerationEducational Data Mining 2023.07.13 2025.05.28 Literature Database
Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04 Algorithm DesignDataset GenerationData Obfuscation 2023.07.04 2025.05.28 Literature Database
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03 Dataset GenerationData Integrity ConstraintsMachine Learning Method 2023.07.03 2025.05.28 Literature Database
TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29 Dataset GenerationOptimization MethodsQuantum Cryptography Technology 2023.06.29 2025.05.28 Literature Database