ATAG: AI-Agent Application Threat Assessment with Attack Graphs Authors: Parth Atulbhai Gandhi, Akansha Shukla, David Tayouri, Beni Ifland, Yuval Elovici, Rami Puzis, Asaf Shabtai | Published: 2025-06-03 Indirect Prompt InjectionGraph ConstructionRisk Assessment 2025.06.03 2025.06.05 Literature Database
On the Price of Differential Privacy for Hierarchical Clustering Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22 Graph ConstructionPrivacy protection frameworkWatermarking Technology 2025.04.22 2025.05.27 Literature Database
Graph Mining for Cybersecurity: A Survey Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16 Graph EmbeddingGraph ConstructionSecurity Analysis 2023.04.02 2025.05.28 Literature Database
Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11 Graph ConstructionPrivacy AssessmentCommunication Model 2022.06.10 2025.05.28 Literature Database
StratLearner: Learning a Strategy for Misinformation Prevention in Social Networks Authors: Guangmo Tong | Published: 2020-09-29 Graph ConstructionInformation ExtractionOptimization Methods 2020.09.29 2025.05.28 Literature Database
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks Authors: Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, Yang Liu | Published: 2019-09-08 Graph ConstructionData-Driven Vulnerability AssessmentMachine Learning 2019.09.08 2025.05.28 Literature Database
HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang | Published: 2019-09-04 Graph ConstructionData Management SystemMachine Learning Algorithm 2019.09.04 2025.05.28 Literature Database
A Graph-Based Machine Learning Approach for Bot Detection Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba | Published: 2019-02-22 Graph ConstructionData PreprocessingBot Detection Method 2019.02.22 2025.05.28 Literature Database
Adversarial Attacks on Graph Neural Networks via Meta Learning Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28 Graph ConstructionAdversarial ExampleAdversarial Attack Methods 2019.02.22 2025.05.28 Literature Database
Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11 Graph ConstructionMalware Detection MethodClassification Pattern Analysis 2019.02.11 2025.05.28 Literature Database