Smooth Anonymity for Sparse Graphs Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14 Algorithm DesignDataset evaluationPrivacy Protection Method 2022.07.13 2025.05.28 Literature Database
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06 Dataset evaluationMalware Detection MethodStatic Analysis 2022.05.25 2025.05.28 Literature Database
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 Dataset evaluationMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Exploiting Multiple EEG Data Domains with Adversarial Learning Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16 Dataset evaluationMachine Learning MethodGenerative Adversarial Network 2022.04.16 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04 Dataset evaluationModel Extraction Attack 2022.04.13 2025.05.28 Literature Database
Online Encrypted Skype Identification Based on an Updating Mechanism Authors: Shi Dong | Published: 2022-03-23 Dataset evaluationTraining Data GenerationFeature Extraction Method 2022.03.23 2025.05.28 Literature Database
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02 Dataset evaluationTraining Data GenerationHyperparameter Optimization 2022.03.22 2025.05.28 Literature Database
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15 Dataset evaluationPrivacy Enhancing TechnologySemi-Supervised Learning 2022.03.15 2025.05.28 Literature Database