Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++ Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03 Deep Learning MethodVulnerability ManagementEvaluation Method 2024.07.24 2025.05.27 Literature Database
Confidential and Protected Disease Classifier using Fully Homomorphic Encryption Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05 Privacy ProtectionThreats of Medical AIDeep Learning Method 2024.05.05 2025.05.27 Literature Database
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15 URL analysis techniquesPhishing DetectionDeep Learning Method 2024.04.15 2025.05.27 Literature Database
Utilizing Deep Learning for Enhancing Network Resilience in Finance Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18 Network Threat DetectionIntrusion Detection SystemDeep Learning Method 2024.02.15 2025.05.27 Literature Database
IoT Network Traffic Analysis with Deep Learning Authors: Mei Liu, Leon Yang | Published: 2024-02-06 Model Performance EvaluationDeep Learning MethodAnomaly Detection Method 2024.02.06 2025.05.27 Literature Database
Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs) Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05 Evaluation Methods for PUFDeep Learning MethodLinear Regression 2024.02.05 2025.05.27 Literature Database
A Review and Comparison of AI Enhanced Side Channel Analysis Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03 WatermarkingCybersecurityDeep Learning Method 2024.02.03 2025.05.27 Literature Database
AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21 Stacking ModelPhishing DetectionDeep Learning Method 2024.01.17 2025.05.27 Literature Database
Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20 IoT Device IdentificationCyber AttackDeep Learning Method 2023.11.20 2025.05.28 Literature Database
Improving the Generation Quality of Watermarked Large Language Models via Word Importance Scoring Authors: Yuhang Li, Yihan Wang, Zhouxing Shi, Cho-Jui Hsieh | Published: 2023-11-16 Token Collection MethodImprovement of LearningDeep Learning Method 2023.11.16 2025.05.28 Literature Database