Dataset Generation

Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data

Authors: John Lim, Jan-Michael Frahm, Fabian Monrose | Published: 2022-04-05
Dataset Generation
Privacy Enhancing Technology
Machine Learning

The Cross-evaluation of Machine Learning-based Network Intrusion Detection Systems

Authors: Giovanni Apruzzese, Luca Pajola, Mauro Conti | Published: 2022-03-09
Dataset Generation
Framework
Generalization Performance

ImageNet-Patch: A Dataset for Benchmarking Machine Learning Robustness against Adversarial Patches

Authors: Maura Pintor, Daniele Angioni, Angelo Sotgiu, Luca Demetrio, Ambra Demontis, Battista Biggio, Fabio Roli | Published: 2022-03-07 | Updated: 2025-01-15
Dataset Generation
Robustness Evaluation
Optimization Strategy

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18
Dataset Generation
Data Generation
Model Performance Evaluation

Why adversarial training can hurt robust accuracy

Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03
Dataset Generation
Robustness
Adversarial Example

A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01
DoS Mitigation
Dataset Generation
Model Architecture

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08
PDF Malware Analysis
Dataset Generation
Machine Learning Algorithm

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12
Dataset Generation
Data Extraction and Analysis
Model Extraction Attack

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning

Authors: Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur | Published: 2021-07-11
Dataset Generation
Data Flow Analysis
Attack Scenario Analysis

A Large-Scale Database for Graph Representation Learning

Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07
Dataset Generation
Performance Evaluation
Malware Detection Method