Deep Learning Method

Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation

Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08
Reinforcement Learning
Deep Learning Method
Federated Learning

Evaluation of Machine Learning Algorithms in Network-Based Intrusion Detection System

Authors: Tuan-Hong Chua, Iftekhar Salam | Published: 2022-03-10
Performance Evaluation
Deep Learning Method
Feature Engineering

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks

Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25
Graph Neural Network
Deep Learning Method
Vulnerability Analysis

Deep Bayesian Learning for Car Hacking Detection

Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17
Machine Learning Method
Deep Learning Method
Vulnerabilities in Autonomous Driving Technology

Robust Upper Bounds for Adversarial Training

Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06
Robust Regression
Adversarial Training
Deep Learning Method

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03
Backdoor Attack
Adversarial Training
Deep Learning Method

Auxiliary-Classifier GAN for Malware Analysis

Authors: Rakesh Nagaraju, Mark Stamp | Published: 2021-07-04
Data Generation
Malware Evolution
Deep Learning Method

SIRNN: A Math Library for Secure RNN Inference

Authors: Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi | Published: 2021-05-10
Library Classification
Deep Learning Method
Computational Efficiency

Security Concerns on Machine Learning Solutions for 6G Networks in mmWave Beam Prediction

Authors: Ferhat Ozgur Catak, Evren Catak, Murat Kuzlu, Umit Cali, Devrim Unal | Published: 2021-05-09 | Updated: 2021-07-23
Adversarial Attack Methods
Optimization Problem
Deep Learning Method

Smartphone Impostor Detection with Behavioral Data Privacy and Minimalist Hardware Support

Authors: Guangyuan Hu, Zecheng He, Ruby B. Lee | Published: 2021-03-11 | Updated: 2021-03-17
Model Performance Evaluation
User Behavior Analysis
Deep Learning Method