Deep Learning Method

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20
IoT Device Identification
Cyber Attack
Deep Learning Method

Improving the Generation Quality of Watermarked Large Language Models via Word Importance Scoring

Authors: Yuhang Li, Yihan Wang, Zhouxing Shi, Cho-Jui Hsieh | Published: 2023-11-16
Token Collection Method
Improvement of Learning
Deep Learning Method

Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks

Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11
Improvement of Learning
Deep Learning Method
Defense Method

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks

Authors: Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram | Published: 2023-11-08
Optimization Methods
Deep Learning Method
Computational Complexity

Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox

Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07
Security Analysis
Dataset Generation
Deep Learning Method

Quantization-aware Neural Architectural Search for Intrusion Detection

Authors: Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte | Published: 2023-11-07 | Updated: 2024-03-02
Improvement of Learning
Deep Learning Method
Quantization and Privacy

SoK: Memorisation in machine learning

Authors: Dmitrii Usynin, Moritz Knolle, Georgios Kaissis | Published: 2023-11-06
Privacy Technique
Memory Evaluation
Deep Learning Method

Label-Only Model Inversion Attacks via Knowledge Transfer

Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30
Privacy Technique
Attack Evaluation
Deep Learning Method

LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference

Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04
Watermarking
Performance Evaluation
Deep Learning Method