Machine Learning Technology

Compact: Approximating Complex Activation Functions for Secure Computation

Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian | Published: 2023-09-09 | Updated: 2024-03-17
MPC Algorithm
Multi-Party Computation
Machine Learning Technology

MONDEO: Multistage Botnet Detection

Authors: Duarte Dias, Bruno Sousa, Nuno Antunes | Published: 2023-08-31
Efficiency Evaluation
Unknown Attack Detection
Machine Learning Technology

Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning

Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30
Interpretation of Topic Models
Classification of Malicious Actors
Machine Learning Technology

A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18
Data Collection
Model Performance Evaluation
Machine Learning Technology

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08
Cyber Attack
Machine Learning Technology

Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage

Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08
Data Protection Method
Membership Disclosure Risk
Machine Learning Technology

Exploiting Code Symmetries for Learning Program Semantics

Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana | Published: 2023-08-07 | Updated: 2024-09-08
Program Interpretation Graph
Machine Learning Technology
Vulnerability detection

A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks

Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17
Dataset Generation
Machine Learning Technology
Threat modeling

Classifying World War II Era Ciphers with Machine Learning

Authors: Brooke Dalton, Mark Stamp | Published: 2023-07-02 | Updated: 2023-08-30
Hyperparameter Tuning
History of Cryptography
Machine Learning Technology

Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments

Authors: Vishal Karanam | Published: 2023-06-14
Security Analysis
Model Performance Evaluation
Machine Learning Technology