Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.28 Literature Database
Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26 Dataset GenerationData CollectionMalware Detection Method 2023.06.26 2025.05.28 Literature Database
JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09 Dataset GenerationModel Performance EvaluationMalicious Website Detection 2023.06.09 2025.05.28 Literature Database
Flow-based Network Intrusion Detection Based on BERT Masked Language Model Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-06-08 Dataset GenerationModel Design and AccuracyIntrusion Detection System 2023.06.08 2025.05.28 Literature Database
DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23 Dataset GenerationIntellectual Property ProtectionWatermark Evaluation 2023.06.02 2025.05.28 Literature Database
Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13 Security AnalysisDataset GenerationNatural Language Processing 2023.04.13 2025.05.28 Literature Database
Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04 Dataset GenerationModel DesignCommunication Model 2022.10.22 2025.05.28 Literature Database
DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09 Dataset GenerationPerformance EvaluationGenerative Adversarial Network 2022.10.13 2025.05.28 Literature Database
Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 Dataset GenerationData GenerationBackdoor Attack 2022.09.29 2025.05.28 Literature Database
You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22 Dataset GenerationPrivacy AssessmentUser Authentication System 2022.09.22 2025.05.28 Literature Database