Dataset evaluation

Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks

Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24
Dataset evaluation
Adversarial Example Detection
Evaluation Method

Beyond Theoretical Bounds: Empirical Privacy Loss Calibration for Text Rewriting Under Local Differential Privacy

Authors: Weijun Li, Arnaud Grivet Sébert, Qiongkai Xu, Annabelle McIver, Mark Dras | Published: 2026-03-24
Dataset evaluation
Differential Privacy
Evaluation Method

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning

Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06
Dataset evaluation
Malware Detection Method
Static Analysis

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18
Dataset evaluation
Membership Inference
Performance Evaluation

Exploiting Multiple EEG Data Domains with Adversarial Learning

Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16
Dataset evaluation
Machine Learning Method
Generative Adversarial Network

Finding MNEMON: Reviving Memories of Node Embeddings

Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29
Algorithm Design
Dataset evaluation
evaluation metrics

Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04
Dataset evaluation
Model Extraction Attack

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23
Dataset evaluation
Training Data Generation
Feature Extraction Method

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02
Dataset evaluation
Training Data Generation
Hyperparameter Optimization