Feature Extraction Method

Multi-party Secure Broad Learning System for Privacy Preserving

Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22
Algorithm Design
Secure Communication Channel
Feature Extraction Method

A Practical Methodology for ML-Based EM Side Channel Disassemblers

Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20
Algorithm Design
Feature Extraction Method
Evaluation Method

R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training

Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27
Security Assurance
Trojan Detection
Feature Extraction Method

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23
Dataset evaluation
Training Data Generation
Feature Extraction Method

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13
Dynamic Analysis
Cryptography
Feature Extraction Method

Secure Routine: A Routine-Based Algorithm for Drivers Identification

Authors: Davide Micale, Gianpiero Costantino, Ilaria Matteucci, Giuseppe Patanè, Giampaolo Bella | Published: 2021-12-12
Machine Learning Algorithm
Machine Learning Technology
Feature Extraction Method

Malware Classification Using Static Disassembly and Machine Learning

Authors: Zhenshuo Chen, Eoin Brophy, Tomas Ward | Published: 2021-12-10
Multi-Class Classification
Feature Extraction Method
Static Analysis

Orthogonal variance-based feature selection for intrusion detection systems

Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25
ML-Based IDS
Machine Learning Algorithm
Feature Extraction Method

Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis

Authors: Chuanpu Fu, Qi Li, Meng Shen, Ke Xu | Published: 2021-06-28 | Updated: 2021-09-16
Feature Extraction Method
Anomaly Detection Method
Communication Analysis

Metamorphic Detection of Repackaged Malware

Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27
Malware Detection Method
Feature Interdependence
Feature Extraction Method