Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24 IoT Security RisksPrivacy ProtectionDeep Learning Technology 2022.10.24 2025.05.28 Literature Database
Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25 Algorithm DesignDeep Learning TechnologySelf-Supervised Learning 2022.06.23 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Attacks Guided by a Transfer-based Prior Authors: Yinpeng Dong, Shuyu Cheng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2022-03-13 PoisoningOptimization MethodsDeep Learning Technology 2022.03.13 2025.05.28 Literature Database
Understanding the Security of Deepfake Detection Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2021-07-05 | Updated: 2021-10-06 PoisoningDeep Learning TechnologyFace Recognition System 2021.07.05 2025.05.28 Literature Database
Towards Scheduling Federated Deep Learning using Meta-Gradients for Inter-Hospital Learning Authors: Rasheed el-Bouri, Tingting Zhu, David A. Clifton | Published: 2021-07-04 Scheduling MethodDeep Learning TechnologyFederated Learning 2021.07.04 2025.05.28 Literature Database
Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01 ML-Based IDSPerformance EvaluationDeep Learning Technology 2021.05.19 2025.05.28 Literature Database
Undistillable: Making A Nasty Teacher That CANNOT teach students Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16 Adversarial LearningDeep Learning TechnologySelf-Supervised Learning 2021.05.16 2025.05.28 Literature Database
LSDAT: Low-Rank and Sparse Decomposition for Decision-based Adversarial Attack Authors: Ashkan Esmaeili, Marzieh Edraki, Nazanin Rahnavard, Mubarak Shah, Ajmal Mian | Published: 2021-03-19 | Updated: 2021-03-22 Adversarial Attack MethodsOptimization ProblemDeep Learning Technology 2021.03.19 2025.05.28 Literature Database
Modeling Multivariate Cyber Risks: Deep Learning Dating Extreme Value Theory Authors: Mingyue Zhang Wu, Jinzhu Luo, Xing Fang, Maochao Xu, Peng Zhao | Published: 2021-03-15 Performance EvaluationRisk Assessment MethodDeep Learning Technology 2021.03.15 2025.05.28 Literature Database
Explaining Network Intrusion Detection System Using Explainable AI Framework Authors: Shraddha Mane, Dattaraj Rao | Published: 2021-03-12 CybersecurityModel ArchitectureDeep Learning Technology 2021.03.12 2025.05.28 Literature Database