Data Origins and Evolution

SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes

Authors: Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro | Published: 2025-05-28
Data Origins and Evolution
Model Design
Dynamic Analysis Method

Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation

Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22
Data Origins and Evolution
パスワードセキュリティ
Machine Learning

Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach

Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03
Data Origins and Evolution
Poisoning
Federated Learning

On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28
Data Origins and Evolution
Data Contamination Detection
Backdoor Attack

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05
Data Origins and Evolution
Data Protection Method
Risk Assessment Method

Data Provenance via Differential Auditing

Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04
Data Origins and Evolution
Privacy Enhancing Technology
Model Performance Evaluation

Challenges and Complexities in Machine Learning based Credit Card Fraud Detection

Authors: Gayan K. Kulatilleke | Published: 2022-08-20
Data Origins and Evolution
Fraudulent Transaction
Machine Learning

FLAIR: Federated Learning Annotated Image Repository

Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18
Data Origins and Evolution
Evaluation of Technological Novelty
Hierarchical Classification Methods

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20
Watermarking
Data Origins and Evolution
Poisoning

Reframing Threat Detection: Inside esINSIDER

Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07
Data Origins and Evolution
Internal Network Reconnaissance
Anomaly Detection Method