Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08 Data Protection MethodMembership Disclosure RiskMachine Learning Technology 2023.08.08 2025.05.28 Literature Database
Exploiting Code Symmetries for Learning Program Semantics Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana | Published: 2023-08-07 | Updated: 2024-09-08 Program Interpretation GraphMachine Learning TechnologyVulnerability detection 2023.08.07 2025.05.28 Literature Database
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17 Dataset GenerationMachine Learning TechnologyThreat modeling 2023.07.17 2025.05.28 Literature Database
Classifying World War II Era Ciphers with Machine Learning Authors: Brooke Dalton, Mark Stamp | Published: 2023-07-02 | Updated: 2023-08-30 Hyperparameter TuningHistory of CryptographyMachine Learning Technology 2023.07.02 2025.05.28 Literature Database
Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 Network Threat DetectionMalware Detection MethodMachine Learning Technology 2023.04.10 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
IoT Federated Blockchain Learning at the Edge Authors: James Calo, Benny Lo | Published: 2023-04-06 Cloud ComputingThreats of Medical AIMachine Learning Technology 2023.04.06 2025.05.28 Literature Database
Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30 Automation of CybersecurityAdversarial ExampleMachine Learning Technology 2023.03.28 2025.05.28 Literature Database
How many dimensions are required to find an adversarial example? Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11 Convergence PropertyAdversarial ExampleMachine Learning Technology 2023.03.24 2025.05.28 Literature Database