Systematic Literature Review: Anti-Phishing Defences and Their Application to Before-the-click Phishing Email Detection Authors: Trevor Wood, Vitor Basto-Fernandes, Eerke Boiten, Iryna Yevseyeva | Published: 2022-04-27 WatermarkingPhishing AttackVisual Similarity Detection 2022.04.27 2025.05.28 Literature Database
SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02 WatermarkingPrivacy ProtectionPrivacy Protection in Machine Learning 2022.04.11 2025.05.28 Literature Database
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31 WatermarkingMembership InferenceDefense Method 2022.01.27 2025.05.28 Literature Database
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 WatermarkingComputational EfficiencyDefense Mechanism 2021.09.01 2025.05.28 Literature Database
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 WatermarkingTime-Frequency Analysisevaluation metrics 2021.07.25 2025.05.28 Literature Database
Teacher Model Fingerprinting Attacks Against Transfer Learning Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23 WatermarkingData CollectionPrompt Injection 2021.06.23 2025.05.28 Literature Database
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 WatermarkingData Origins and EvolutionPoisoning 2021.05.20 2025.05.28 Literature Database
Simple Transparent Adversarial Examples Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20 WatermarkingAdversarial attackVulnerability Attack Method 2021.05.20 2025.05.28 Literature Database
Balboa: Bobbing and Weaving around Network Censorship Authors: Marc B. Rosen, James Parker, Alex J. Malozemoff | Published: 2021-04-13 WatermarkingCommunication AnalysisSpeech Synthesis Technology 2021.04.13 2025.05.28 Literature Database
MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05 WatermarkingMulti-Class ClassificationDeep Learning Technology 2021.03.05 2025.05.28 Literature Database