Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24 Dataset evaluationAdversarial Example DetectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Beyond Theoretical Bounds: Empirical Privacy Loss Calibration for Text Rewriting Under Local Differential Privacy Authors: Weijun Li, Arnaud Grivet Sébert, Qiongkai Xu, Annabelle McIver, Mark Dras | Published: 2026-03-24 Dataset evaluationDifferential PrivacyEvaluation Method 2026.03.24 2026.03.26 Literature Database
Smooth Anonymity for Sparse Graphs Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14 Algorithm DesignDataset evaluationPrivacy Protection Method 2022.07.13 2025.05.28 Literature Database
Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06 Dataset evaluationMalware Detection MethodStatic Analysis 2022.05.25 2025.05.28 Literature Database
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 Dataset evaluationMembership InferencePerformance Evaluation 2022.05.18 2025.05.28 Literature Database
Exploiting Multiple EEG Data Domains with Adversarial Learning Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16 Dataset evaluationMachine Learning MethodGenerative Adversarial Network 2022.04.16 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04 Dataset evaluationModel Extraction Attack 2022.04.13 2025.05.28 Literature Database
Online Encrypted Skype Identification Based on an Updating Mechanism Authors: Shi Dong | Published: 2022-03-23 Dataset evaluationTraining Data GenerationFeature Extraction Method 2022.03.23 2025.05.28 Literature Database
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02 Dataset evaluationTraining Data GenerationHyperparameter Optimization 2022.03.22 2025.05.28 Literature Database