Threat Detection for General Social Engineering Attack Using Machine Learning Techniques Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17 Dataset evaluationPerformance Evaluation MetricsFeature Selection Method 2022.03.15 2025.05.13 Literature Database
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt | Published: 2022-03-01 Dataset evaluationModel Design and AccuracyVulnerabilities in Autonomous Driving Technology 2022.03.01 2025.05.13 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 Dataset evaluationPoisoningRobustness Evaluation 2022.02.05 2025.05.13 Literature Database
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration Authors: Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro | Published: 2021-12-02 Dataset evaluationData PreprocessingGeneralization Performance 2021.12.02 2025.05.13 Literature Database
Benchmark Static API Call Datasets for Malware Family Classification Authors: Berkant Düzgün, Aykut Çayır, Ferhat Demirkıran, Ceyda Nur Kahya, Buket Gençaydın, Hasan Dağ | Published: 2021-11-30 | Updated: 2022-08-04 Dataset evaluationMalware Detection MethodStatic Analysis 2021.11.30 2025.05.13 Literature Database
Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24 Dataset evaluationData Integrity ConstraintsMachine Learning Application 2021.11.24 2025.05.13 Literature Database
Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23 Dataset evaluationModel Selection MethodRisk Assessment Method 2021.11.23 2025.05.13 Literature Database
On the Importance of Difficulty Calibration in Membership Inference Attacks Authors: Lauren Watson, Chuan Guo, Graham Cormode, Alex Sablayrolles | Published: 2021-11-15 | Updated: 2022-04-11 Dataset evaluationMembership InferenceHigh Difficulty Sample 2021.11.15 2025.05.13 Literature Database
Property Inference Attacks Against GANs Authors: Junhao Zhou, Yufei Chen, Chao Shen, Yang Zhang | Published: 2021-11-15 Dataset evaluationData GenerationMembership Inference 2021.11.15 2025.05.13 Literature Database
Get a Model! Model Hijacking Attack Against Machine Learning Models Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08 Dataset evaluationBackdoor AttackAdversarial Attack Methods 2021.11.08 2025.05.13 Literature Database