Data Collection

Machine Learning Models Disclosure from Trusted Research Environments (TRE), Challenges and Opportunities

Authors: Esma Mansouri-Benssassi, Simon Rogers, Jim Smith, Felix Ritchie, Emily Jefferson | Published: 2021-11-10 | Updated: 2022-08-20
Data Collection
Privacy Risk Management
Privacy Protection in Machine Learning

Color Teams for Machine Learning Development

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20
Automation of Cybersecurity
Data Collection
Machine Learning Framework

Teacher Model Fingerprinting Attacks Against Transfer Learning

Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23
Watermarking
Data Collection
Prompt Injection

Outlier Detection and Spatial Analysis Algorithms

Authors: Jacob John | Published: 2021-06-20
Data Preprocessing
Data Collection
Data-Driven Clustering

Longitudinal Compliance Analysis of Android Applications with Privacy Policies

Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28
Data Collection
Data Leakage
Privacy Enhancing Technology

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28
Data Preprocessing
Data Collection
User Behavior Analysis

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25
Cyber Attack
Cyber Threat
Data Collection

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24
Data Collection
User Behavior Analysis
Classification Pattern Analysis

Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection

Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20
ML-Based IDS
Data Preprocessing
Data Collection

Darknet Data Mining — A Canadian Cyber-crime Perspective

Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18
Darknet Traffic Analysis
Data Collection
Risk Management