Deep Learning Method

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03
Deep Learning Method
Vulnerability Management
Evaluation Method

Confidential and Protected Disease Classifier using Fully Homomorphic Encryption

Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05
Privacy Protection
Threats of Medical AI
Deep Learning Method

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15
URL analysis techniques
Phishing Detection
Deep Learning Method

Utilizing Deep Learning for Enhancing Network Resilience in Finance

Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18
Network Threat Detection
Intrusion Detection System
Deep Learning Method

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
Model Performance Evaluation
Deep Learning Method
Anomaly Detection Method

Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs)

Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05
Evaluation Methods for PUF
Deep Learning Method
Linear Regression

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20
IoT Device Identification
Cyber Attack
Deep Learning Method

Improving the Generation Quality of Watermarked Large Language Models via Word Importance Scoring

Authors: Yuhang Li, Yihan Wang, Zhouxing Shi, Cho-Jui Hsieh | Published: 2023-11-16
Token Collection Method
Improvement of Learning
Deep Learning Method