Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08 Reinforcement LearningDeep Learning MethodFederated Learning 2022.06.08 2025.05.28 Literature Database
Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10 Performance EvaluationDeep Learning MethodFeature Engineering 2022.03.10 2025.05.28 Literature Database
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25 Graph Neural NetworkDeep Learning MethodVulnerability Analysis 2022.03.10 2025.05.28 Literature Database
Deep Bayesian Learning for Car Hacking Detection Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17 Machine Learning MethodDeep Learning MethodVulnerabilities in Autonomous Driving Technology 2021.12.17 2025.05.28 Literature Database
Robust Upper Bounds for Adversarial Training Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06 Robust RegressionAdversarial TrainingDeep Learning Method 2021.12.17 2025.05.28 Literature Database
Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03 Backdoor AttackAdversarial TrainingDeep Learning Method 2021.10.03 2025.05.28 Literature Database
Auxiliary-Classifier GAN for Malware Analysis Authors: Rakesh Nagaraju, Mark Stamp | Published: 2021-07-04 Data GenerationMalware EvolutionDeep Learning Method 2021.07.04 2025.05.28 Literature Database
SIRNN: A Math Library for Secure RNN Inference Authors: Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi | Published: 2021-05-10 Library ClassificationDeep Learning MethodComputational Efficiency 2021.05.10 2025.05.28 Literature Database
Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal | Published: 2021-05-09 | Updated: 2021-07-23 Adversarial Attack MethodsOptimization ProblemDeep Learning Method 2021.05.09 2025.05.28 Literature Database
Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17 Model Performance EvaluationUser Behavior AnalysisDeep Learning Method 2021.03.11 2025.05.28 Literature Database