User Activity Analysis

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12
Attack Methods against DFL
Backdoor Attack
User Activity Analysis

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15
User Activity Analysis
Performance Evaluation Metrics
Machine Learning Algorithm

AI Total: Analyzing Security ML Models with Imperfect Data in Production

Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13
Data Management System
Model Selection
User Activity Analysis

Machine learning on knowledge graphs for context-aware security monitoring

Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18
ML-Based IDS
User Activity Analysis
Knowledge Graph

Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs

Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20
Command Analysis
User Activity Analysis
Time-Related Features

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15
Data Protection Method
Data Collection
User Activity Analysis

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08
Training Method
Privacy Protection Method
User Activity Analysis

WebEye – Automated Collection of Malicious HTTP Traffic

Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16
Data Collection
User Activity Analysis
Malicious Website Detection

Generative Models for Spear Phishing Posts on Social Media

Authors: John Seymour, Philip Tully | Published: 2018-02-14
Data Collection
User Activity Analysis
Machine Learning Method

PerfWeb: How to Violate Web Privacy with Hardware Performance Events

Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12
Performance Evaluation
Model Performance Evaluation
User Activity Analysis