Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 Dataset GenerationData GenerationBackdoor Attack 2022.09.29 2025.05.28 Literature Database
You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22 Dataset GenerationPrivacy AssessmentUser Authentication System 2022.09.22 2025.05.28 Literature Database
Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study Authors: Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud | Published: 2022-09-21 AlgorithmDataset GenerationEvaluation of Technological Novelty 2022.09.21 2025.05.28 Literature Database
Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 Dataset GenerationModel Performance EvaluationMachine Learning 2022.09.13 2025.05.28 Literature Database
Beyond Random Split for Assessing Statistical Model Performance Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta | Published: 2022-09-04 Sampling MethodDataset GenerationModel Design 2022.09.04 2025.05.28 Literature Database
Phishing URL Detection: A Network-based Approach Robust to Evasion Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03 Dataset GenerationPhishing DetectionClassification Pattern Analysis 2022.09.03 2025.05.28 Literature Database
Explainable Artificial Intelligence Applications in Cyber Security: State-of-the-Art in Research Authors: Zhibo Zhang, Hussam Al Hamadi, Ernesto Damiani, Chan Yeob Yeun, Fatma Taher | Published: 2022-08-31 Application of XAIDataset GenerationModel Interpretability 2022.08.31 2025.05.28 Literature Database
Fraud Dataset Benchmark and Applications Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22 Dataset GenerationFeature Importance Analysis 2022.08.30 2025.05.28 Literature Database
Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27 Dataset GenerationLink EmulationAttackers and Malicious Devices 2022.07.28 2025.05.28 Literature Database
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27 Dataset GenerationPerformance EvaluationMachine Learning 2022.07.27 2025.05.28 Literature Database