Watermarking

When PETs misbehave: A Contextual Integrity analysis

Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05
Watermarking
Privacy Protection
Privacy Protection Method

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05
Watermarking
Data Generation
Intrusion Detection System

Hot PATE: Private Aggregation of Distributions for Diverse Task

Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17
Watermarking
Privacy Protection Method
Computational Efficiency

Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03
Evaluation Methods for PUF
Watermarking
Attack Method

FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning

Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02
Watermarking
Fraudulent Transaction
Watermark Evaluation

Malicious code detection in android: the role of sequence characteristics and disassembling methods

Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02
LSTM Model Performance Evaluation
Watermarking
Malware Classification

Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting

Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05
Watermarking
Machine Unlearning
Watermark Evaluation

TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features

Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21
URL analysis techniques
Watermarking
Malicious Website Detection

MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files

Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08
Watermarking
Malware Classification
Watermarking Settings for Medical Data

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack