Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11 Security AnalysisData CollectionDeep Transfer Learning 2022.04.11 2025.05.28 Literature Database
Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07 Security AnalysisHardware SecurityQuantum Machine Learning 2022.04.07 2025.05.28 Literature Database
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17 Characteristics of APT AttacksSecurity AnalysisAnomaly Detection Method 2022.04.07 2025.05.28 Literature Database
Android Malware Category and Family Detection and Identification using Machine Learning Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05 Security AnalysisMachine LearningMachine Learning Technology 2021.07.05 2025.05.28 Literature Database
ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare Authors: Ali Burak Ünal, Mete Akgün, Nico Pfeifer | Published: 2020-12-04 Security AnalysisFrameworkPrivacy Protection in Machine Learning 2020.12.04 2025.05.28 Literature Database
TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07 Content ModerationSecurity AnalysisAdversarial Learning 2020.12.04 2025.05.28 Literature Database
Clustering and Analysis of Vulnerabilities Present in Different Robot Types Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18 Clustering methodsSecurity AnalysisThreat Model 2020.08.18 2025.05.28 Literature Database
Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13 WatermarkingCode Change AnalysisSecurity Analysis 2020.08.13 2025.05.28 Literature Database
Deep-Lock: Secure Authorization for Deep Neural Networks Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18 WatermarkingSecurity AnalysisMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Efficient Sparse Secure Aggregation for Federated Learning Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18 Security AnalysisPrivacy AssessmentComputational Efficiency 2020.07.29 2025.05.28 Literature Database