A Systematic Literature Review on Phishing and Anti-Phishing Techniques Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02 Phishing AttackPhishing DetectionResearch Methodology 2021.04.02 2025.05.28 Literature Database
Stack-based Buffer Overflow Detection using Recurrent Neural Networks Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30 Data Generation MethodMachine Learning MethodResearch Methodology 2020.12.30 2025.05.28 Literature Database
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach Authors: Benjamin M. Ampel | Published: 2020-12-26 Challenges of Data LabelingMachine Learning AlgorithmResearch Methodology 2020.12.26 2025.05.28 Literature Database
Twitter Spam Detection: A Systematic Review Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01 Spam Detection MethodUser Behavior AnalysisResearch Methodology 2020.11.30 2025.05.28 Literature Database
Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08 Relationship between Robustness and PrivacyVulnerability of Adversarial ExamplesResearch Methodology 2020.09.28 2025.05.28 Literature Database
Black-box Adversarial Sample Generation Based on Differential Evolution Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30 Attack MethodDeep LearningResearch Methodology 2020.07.30 2025.05.28 Literature Database
Enhancing Certified Robustness via Smoothed Weighted Ensembling Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23 AlgorithmGeneralization PerformanceResearch Methodology 2020.05.19 2025.05.28 Literature Database
Secondary Use of Electronic Health Record: Opportunities and Challenges Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26 Privacy Enhancing TechnologyResearch MethodologyClinical Research 2020.01.26 2025.05.28 Literature Database
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21 Adversarial LearningAdversarial Attack DetectionResearch Methodology 2020.01.16 2025.05.28 Literature Database
An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26 PoisoningAdversarial ExampleResearch Methodology 2019.11.26 2025.05.28 Literature Database