Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
Machine Learning Algorithms In User Authentication Schemes Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15 User Activity AnalysisPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.15 2025.05.28 Literature Database
AI Total: Analyzing Security ML Models with Imperfect Data in Production Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13 Data Management SystemModel SelectionUser Activity Analysis 2021.10.13 2025.05.28 Literature Database
Machine learning on knowledge graphs for context-aware security monitoring Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18 ML-Based IDSUser Activity AnalysisKnowledge Graph 2021.05.18 2025.05.28 Literature Database
Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20 Command AnalysisUser Activity AnalysisTime-Related Features 2021.04.20 2025.05.28 Literature Database
Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15 Data Protection MethodData CollectionUser Activity Analysis 2021.02.16 2025.05.28 Literature Database
DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08 Training MethodPrivacy Protection MethodUser Activity Analysis 2020.03.23 2025.05.28 Literature Database
WebEye – Automated Collection of Malicious HTTP Traffic Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16 Data CollectionUser Activity AnalysisMalicious Website Detection 2018.02.16 2025.05.28 Literature Database
Generative Models for Spear Phishing Posts on Social Media Authors: John Seymour, Philip Tully | Published: 2018-02-14 Data CollectionUser Activity AnalysisMachine Learning Method 2018.02.14 2025.05.28 Literature Database
PerfWeb: How to Violate Web Privacy with Hardware Performance Events Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12 Performance EvaluationModel Performance EvaluationUser Activity Analysis 2017.05.12 2025.05.28 Literature Database