CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01 Model Performance EvaluationExperimental ValidationHierarchical Classification Methods 2022.09.01 2025.05.28 Literature Database
Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26 Privacy Protection MethodFrameworkExperimental Validation 2022.08.26 2025.05.28 Literature Database
Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks Authors: Aline R. Ioste, Alan M. Durham, Marcelo Finger | Published: 2022-04-30 Distributed LearningConvergence analysisExperimental Validation 2022.04.30 2025.05.28 Literature Database
Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT Authors: Liu Zhang, Zilong Wang | Published: 2022-04-13 Algorithm DesignExperimental Validationevaluation metrics 2022.04.13 2025.05.28 Literature Database
FROB: Few-shot ROBust Model for Classification and Out-of-Distribution Detection Authors: Nikolaos Dionelis, Mehrdad Yaghoobi, Sotirios A. Tsaftaris | Published: 2021-11-30 | Updated: 2022-02-02 Generalization PerformanceExperimental ValidationSelf-Supervised Learning 2021.11.30 2025.05.28 Literature Database
Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15 AlgorithmExperimental ValidationWatermark Robustness 2021.07.29 2025.05.28 Literature Database
Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness Authors: Haidong Xie, Lixin Qian, Xueshuang Xiang, Naijin Liu | Published: 2020-04-10 Pruning MethodRobustnessExperimental Validation 2020.04.10 2025.05.28 Literature Database
Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16 Backdoor AttackPrivacy-Preserving Data MiningExperimental Validation 2019.11.16 2025.05.28 Literature Database
Comment on “AndrODet: An adaptive Android obfuscation detector” Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18 Software SecurityExperimental ValidationMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database
Defensive Escort Teams via Multi-Agent Deep Reinforcement Learning Authors: Arpit Garg, Yazied A. Hasan, Adam Yañez, Lydia Tapia | Published: 2019-10-09 Risk AssessmentExperimental ValidationReinforcement Learning Environment 2019.10.09 2025.05.28 Literature Database