A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07 Security AnalysisDataset GenerationDeep Learning Method 2023.11.07 2025.05.28 Literature Database
Software Repositories and Machine Learning Research in Cyber Security Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01 Security AnalysisSoftware SecurityTopic Modeling 2023.11.01 2025.05.28 Literature Database
Security Challenges for Cloud or Fog Computing-Based AI Applications Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20 Edge ComputingSecurity AnalysisData Leakage 2023.10.30 2025.05.28 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Robust and Actively Secure Serverless Collaborative Learning Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25 Security AnalysisByzantine ResilienceComputational Efficiency 2023.10.25 2025.05.28 Literature Database
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Critical Path Prioritization Dashboard for Alert-driven Attack Graphs Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem | Published: 2023-10-19 Security AnalysisUser Experience EvaluationAttack Graph Generation 2023.10.19 2025.05.28 Literature Database
The Efficacy of Transformer-based Adversarial Attacks in Security Domains Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17 Security AnalysisModel DesignAdversarial Example 2023.10.17 2025.05.28 Literature Database