Performance Evaluation

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Authors: Khoa D. Doan, Yingjie Lao, Ping Li | Published: 2022-10-17
Backdoor Attack
Performance Evaluation

Federated Learning with Privacy-Preserving Ensemble Attention Distillation

Authors: Xuan Gong, Liangchen Song, Rishi Vedula, Abhishek Sharma, Meng Zheng, Benjamin Planche, Arun Innanje, Terrence Chen, Junsong Yuan, David Doermann, Ziyan Wu | Published: 2022-10-16
Privacy Risk Management
Poisoning
Performance Evaluation

DI-NIDS: Domain Invariant Network Intrusion Detection System

Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15
Performance Evaluation
Machine Learning Technology
Deep Learning Method

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09
Dataset Generation
Performance Evaluation
Generative Adversarial Network

Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19
Model Performance Evaluation
Improvement of Learning
Performance Evaluation

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10
IoT Security Risks
Performance Evaluation
Machine Learning Method

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
Performance Evaluation
Attack Evaluation
Machine Learning Method

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08
Malware Detection Method
Performance Evaluation
Communication Analysis

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01
Stability of Predictions
Performance Evaluation
Machine Learning Method

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27
Dataset Generation
Performance Evaluation
Machine Learning