Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28 Out-of-Distribution DetectionUnknown Attack DetectionMachine Learning Method 2023.08.28 2025.05.28 Literature Database
Active learning for fast and slow modeling attacks on Arbiter PUFs Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25 Evaluation Methods for PUFActive LearningMachine Learning Method 2023.08.25 2025.05.28 Literature Database
Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings Authors: Mark-Oliver Stehr, Minyoung Kim | Published: 2023-08-23 Clustering methodsMembership InferenceMachine Learning Method 2023.08.23 2025.05.28 Literature Database
Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17 WatermarkingCryptographyMachine Learning Method 2023.08.17 2025.05.28 Literature Database
Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11 Intrusion Detection SystemMachine Learning MethodDeep Learning Method 2023.08.05 2025.05.28 Literature Database
Privacy Preserving In-memory Computing Engine Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu | Published: 2023-08-04 | Updated: 2023-08-10 Data Protection MethodData CollectionMachine Learning Method 2023.08.04 2025.05.28 Literature Database
ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics Authors: Víctor Mayoral-Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-04 Q-Learning AlgorithmPenetration Testing ApplicabilityMachine Learning Method 2023.08.04 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18 Malware Detection MethodMachine Learning MethodBehavior Analysis Method 2023.07.18 2025.05.28 Literature Database
Discretization-based ensemble model for robust learning in IoT Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18 Robustness EvaluationAdversarial ExampleMachine Learning Method 2023.07.18 2025.05.28 Literature Database