Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17 WatermarkingCryptographyMachine Learning Method 2023.08.17 2025.05.28 Literature Database
Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11 Intrusion Detection SystemMachine Learning MethodDeep Learning Method 2023.08.05 2025.05.28 Literature Database
Privacy Preserving In-memory Computing Engine Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu | Published: 2023-08-04 | Updated: 2023-08-10 Data Protection MethodData CollectionMachine Learning Method 2023.08.04 2025.05.28 Literature Database
ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics Authors: Víctor Mayoral-Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-04 Q-Learning AlgorithmPenetration Testing ApplicabilityMachine Learning Method 2023.08.04 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18 Malware Detection MethodMachine Learning MethodBehavior Analysis Method 2023.07.18 2025.05.28 Literature Database
Discretization-based ensemble model for robust learning in IoT Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18 Robustness EvaluationAdversarial ExampleMachine Learning Method 2023.07.18 2025.05.28 Literature Database
Metadata-based Malware Detection on Android using Machine Learning Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17 Dataset GenerationMalware Detection MethodMachine Learning Method 2023.07.17 2025.05.28 Literature Database
Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15 Dataset GenerationTime Window AnalysisMachine Learning Method 2023.07.15 2025.05.28 Literature Database
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03 Dataset GenerationData Integrity ConstraintsMachine Learning Method 2023.07.03 2025.05.28 Literature Database