SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes Authors: Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro | Published: 2025-05-28 Data Origins and EvolutionModel DesignDynamic Analysis Method 2025.05.28 2025.05.30 Literature Database
Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22 Data Origins and EvolutionパスワードセキュリティMachine Learning 2025.05.22 2025.05.28 Literature Database
Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03 Data Origins and EvolutionPoisoningFederated Learning 2024.03.03 2025.05.27 Literature Database
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 Data Origins and EvolutionData Contamination DetectionBackdoor Attack 2023.06.28 2025.05.28 Literature Database
Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05 Data Origins and EvolutionData Protection MethodRisk Assessment Method 2022.10.05 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 Data Origins and EvolutionPrivacy Enhancing TechnologyModel Performance Evaluation 2022.09.04 2025.05.28 Literature Database
Challenges and Complexities in Machine Learning based Credit Card Fraud Detection Authors: Gayan K. Kulatilleke | Published: 2022-08-20 Data Origins and EvolutionFraudulent TransactionMachine Learning 2022.08.20 2025.05.28 Literature Database
FLAIR: Federated Learning Annotated Image Repository Authors: Congzheng Song, Filip Granqvist, Kunal Talwar | Published: 2022-07-18 Data Origins and EvolutionEvaluation of Technological NoveltyHierarchical Classification Methods 2022.07.18 2025.05.28 Literature Database
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 WatermarkingData Origins and EvolutionPoisoning 2021.05.20 2025.05.28 Literature Database
Reframing Threat Detection: Inside esINSIDER Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07 Data Origins and EvolutionInternal Network ReconnaissanceAnomaly Detection Method 2019.04.07 2025.05.28 Literature Database