Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 Dataset GenerationModel Performance EvaluationMachine Learning 2022.09.13 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 Data Origins and EvolutionPrivacy Enhancing TechnologyModel Performance Evaluation 2022.09.04 2025.05.28 Literature Database
Group Property Inference Attacks Against Graph Neural Networks Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02 Membership InferenceModel Performance EvaluationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Tweaking Metasploit to Evade Encrypted C2 Traffic Detection Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02 Model Performance EvaluationAdversarial Attack MethodsCommunication Analysis 2022.09.02 2025.05.28 Literature Database
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02 Model InterpretabilityModel Performance EvaluationExperimental Validation 2022.09.02 2025.05.28 Literature Database
CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01 Model Performance EvaluationExperimental ValidationHierarchical Classification Methods 2022.09.01 2025.05.28 Literature Database
DiVa: An Accelerator for Differentially Private Machine Learning Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26 Model Performance EvaluationEfficiency EvaluationImprovement of Learning 2022.08.26 2025.05.28 Literature Database
Generative Extraction of Audio Classifiers for Speaker Identification Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26 Dataset GenerationModel Performance EvaluationSpeech Recognition Process 2022.07.26 2025.05.28 Literature Database
$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25 Out-of-Distribution DetectionModel Performance EvaluationHierarchical Classification Methods 2022.07.25 2025.05.28 Literature Database
Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25 Attack Methods against DFLMembership InferenceModel Performance Evaluation 2022.07.25 2025.05.28 Literature Database