Dataset Generation

Augmentation Backdoors

Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29
Dataset Generation
Data Generation
Backdoor Attack

You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22
Dataset Generation
Privacy Assessment
User Authentication System

Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study

Authors: Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud | Published: 2022-09-21
Algorithm
Dataset Generation
Evaluation of Technological Novelty

Detection of Malicious Websites Using Machine Learning Techniques

Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13
Dataset Generation
Model Performance Evaluation
Machine Learning

Beyond Random Split for Assessing Statistical Model Performance

Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta | Published: 2022-09-04
Sampling Method
Dataset Generation
Model Design

Phishing URL Detection: A Network-based Approach Robust to Evasion

Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03
Dataset Generation
Phishing Detection
Classification Pattern Analysis

Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research

Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31
Application of XAI
Dataset Generation
Model Interpretability

Fraud Dataset Benchmark and Applications

Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22
Dataset Generation
Feature Importance Analysis

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27
Dataset Generation
Link Emulation
Attackers and Malicious Devices

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27
Dataset Generation
Performance Evaluation
Machine Learning