Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22 Data Origins and EvolutionパスワードセキュリティMachine Learning 2025.05.22 2025.05.28 Literature Database
Private Transformer Inference in MLaaS: A Survey Authors: Yang Li, Xinyu Zhou, Yitong Wang, Liangxin Qian, Jun Zhao | Published: 2025-05-15 Encryption TechnologyMachine LearningComputational Consistency 2025.05.15 2025.05.28 Literature Database
Malicious Code Detection in Smart Contracts via Opcode Vectorization Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17 Smart Contract AuditMachine LearningVulnerability Management 2025.04.17 2025.05.27 Literature Database
Using Topological Data Analysis to classify Encrypted Bits Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18 Algorithm DesignMachine LearningImage Forensics 2023.01.18 2025.05.28 Literature Database
Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 Dataset GenerationModel Performance EvaluationMachine Learning 2022.09.13 2025.05.28 Literature Database
Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09 IC Counterfeiting Prevention MethodMemory Management MethodMachine Learning 2022.09.09 2025.05.28 Literature Database
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25 CybersecurityAttack DetectionMachine Learning 2022.08.25 2025.05.28 Literature Database
Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data Authors: Gayan K. Kulatilleke, Sugandika Samarakoon | Published: 2022-08-25 Fraudulent TransactionAnalysis of Detection MethodsMachine Learning 2022.08.25 2025.05.28 Literature Database
Credit card fraud detection – Classifier selection strategy Authors: Gayan K. Kulatilleke | Published: 2022-08-25 Fraudulent TransactionMachine LearningMachine Learning Technology 2022.08.25 2025.05.28 Literature Database
ABL: An original active blacklist based on a modification of the SMTP Authors: Pablo M. Oliveira, Mateus B. Vieira, Isaac C. Ferreira, João P. R. R. Leite, Edvard M. Oliveira, Bruno T. Kuehne, Edmilson M. Moreira, Otávio A. S. Carpinteiro | Published: 2022-08-22 Spam PreventionEmail SecurityMachine Learning 2022.08.22 2025.05.28 Literature Database