AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21 Stacking ModelPhishing DetectionDeep Learning Method 2024.01.17 2025.05.27 Literature Database
Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20 IoT Device IdentificationCyber AttackDeep Learning Method 2023.11.20 2025.05.28 Literature Database
Improving the Generation Quality of Watermarked Large Language Models via Word Importance Scoring Authors: Yuhang Li, Yihan Wang, Zhouxing Shi, Cho-Jui Hsieh | Published: 2023-11-16 Token Collection MethodImprovement of LearningDeep Learning Method 2023.11.16 2025.05.28 Literature Database
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 Improvement of LearningDeep Learning MethodDefense Method 2023.11.11 2025.05.28 Literature Database
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks Authors: Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram | Published: 2023-11-08 Optimization MethodsDeep Learning MethodComputational Complexity 2023.11.08 2025.05.28 Literature Database
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07 Security AnalysisDataset GenerationDeep Learning Method 2023.11.07 2025.05.28 Literature Database
Quantization-aware Neural Architectural Search for Intrusion Detection Authors: Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte | Published: 2023-11-07 | Updated: 2024-03-02 Improvement of LearningDeep Learning MethodQuantization and Privacy 2023.11.07 2025.05.28 Literature Database
SoK: Memorisation in machine learning Authors: Dmitrii Usynin, Moritz Knolle, Georgios Kaissis | Published: 2023-11-06 Privacy TechniqueMemory EvaluationDeep Learning Method 2023.11.06 2025.05.28 Literature Database
Label-Only Model Inversion Attacks via Knowledge Transfer Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30 Privacy TechniqueAttack EvaluationDeep Learning Method 2023.10.30 2025.05.28 Literature Database
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04 WatermarkingPerformance EvaluationDeep Learning Method 2023.09.25 2025.05.28 Literature Database