Phocas: dimensional Byzantine-resilient stochastic gradient descent Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-05-23 Byzantine Attack CountermeasuresInformation SecurityLoss Function 2018.05.23 2025.05.28 Literature Database
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18 Certified RobustnessInformation SecurityAdversarial Attack Detection 2018.05.17 2025.05.28 Literature Database
Secure Mobile Edge Computing in IoT via Collaborative Online Learning Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09 CybersecurityInformation SecurityAttack Detection 2018.05.09 2025.05.28 Literature Database
Detecting Compressed Cleartext Traffic from Consumer Internet of Things Devices Authors: Daniel Hahn, Noah Apthorpe, Nick Feamster | Published: 2018-05-07 CybersecurityInformation SecurityDeep Learning Model 2018.05.07 2025.05.28 Literature Database
Automatic Classification of Object Code Using Machine Learning Authors: John Clemens | Published: 2018-05-06 Data-Driven Vulnerability AssessmentProgram AnalysisInformation Security 2018.05.06 2025.05.28 Literature Database
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15 Data Collection MethodMalware Detection MethodInformation Security 2017.10.15 2025.05.28 Literature Database
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.28 Literature Database
Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12 Convergence PropertyInformation SecurityStructural Attack 2017.10.12 2025.05.28 Literature Database
Computation on Encrypted Data using Data Flow Authentication Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01 Information SecurityInformation Flow ControlWatermark 2017.10.01 2025.05.28 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.28 Literature Database