Feature Extraction Method

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
Poisoning attack on RAG
Performance Evaluation Method
Feature Extraction Method

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04
Feature Extraction Method
Feature Selection Method
Computational Efficiency

Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08
Malware Detection Method
Feature Extraction Method
Natural Language Processing

FLAG: Finding Line Anomalies (in code) with Generative AI

Authors: Baleegh Ahmad, Benjamin Tan, Ramesh Karri, Hammond Pearce | Published: 2023-06-22
Program Analysis
Malware Detection Method
Feature Extraction Method

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21
Algorithm
Challenges of Log Analysis
Feature Extraction Method

DPMLBench: Holistic Evaluation of Differentially Private Machine Learning

Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen | Published: 2023-05-10 | Updated: 2023-10-14
Training Data Generation
Privacy Assessment
Feature Extraction Method

Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model

Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29
Real-Time Inference
Feature Extraction Method
Image Feature Extraction

GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14
Watermarking
Privacy Assessment
Feature Extraction Method

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07
Protocol Performance Evaluation
Malware Detection Method
Feature Extraction Method

Lateral Movement Detection Using User Behavioral Analysis

Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29
User Behavior Analysis
Machine Learning Technology
Feature Extraction Method