A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09 Attack MethodMachine Learning MethodTemperature Conditions 2022.05.09 2025.05.28 Literature Database
Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16 Privacy AssessmentUser Experience EvaluationAttack Method 2022.05.08 2025.05.28 Literature Database
Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08 Performance EvaluationIntrusion Detection SystemAttack Method 2022.05.08 2025.05.28 Literature Database
Fusion: Efficient and Secure Inference Resilient to Malicious Servers Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10 Privacy Enhancing TechnologyAttack MethodCommunication Efficiency 2022.05.06 2025.05.28 Literature Database
An Adversarial Attack Analysis on Malicious Advertisement URL Detection Framework Authors: Ehsan Nowroozi, Abhishek, Mohammadreza Mohammadi, Mauro Conti | Published: 2022-04-27 CybersecurityPhishing AttackAttack Method 2022.04.27 2025.05.28 Literature Database
Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier Authors: Anupama Mishra | Published: 2022-04-27 CybersecurityModel DesignAttack Method 2022.04.27 2025.05.28 Literature Database
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18 DDoS AttackEnergy-Based ModelAttack Method 2022.03.18 2025.05.28 Literature Database
Generative Models for Security: Attacks, Defenses, and Opportunities Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29 PoisoningAttack MethodGenerative Model 2021.07.21 2025.05.28 Literature Database
Secure Random Sampling in Differential Privacy Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24 Sampling MethodAttack MethodOverview of Floating Point Numbers 2021.07.21 2025.05.28 Literature Database
MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI Authors: Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara | Published: 2021-07-19 Membership InferenceModel InterpretabilityAttack Method 2021.07.19 2025.05.28 Literature Database