On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15 Dataset evaluationPrivacy Enhancing TechnologySemi-Supervised Learning 2022.03.15 2025.05.28 Literature Database
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17 Dataset evaluationPerformance Evaluation MetricsFeature Selection Method 2022.03.15 2025.05.28 Literature Database
Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt | Published: 2022-03-01 Dataset evaluationModel Design and AccuracyVulnerabilities in Autonomous Driving Technology 2022.03.01 2025.05.28 Literature Database
Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14 Dataset evaluationPoisoningRobustness Evaluation 2022.02.05 2025.05.28 Literature Database
Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration Authors: Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro | Published: 2021-12-02 Dataset evaluationData PreprocessingGeneralization Performance 2021.12.02 2025.05.28 Literature Database
Benchmark Static API Call Datasets for Malware Family Classification Authors: Berkant Düzgün, Aykut Çayır, Ferhat Demirkıran, Ceyda Nur Kahya, Buket Gençaydın, Hasan Dağ | Published: 2021-11-30 | Updated: 2022-08-04 Dataset evaluationMalware Detection MethodStatic Analysis 2021.11.30 2025.05.28 Literature Database
Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24 Dataset evaluationData Integrity ConstraintsMachine Learning Application 2021.11.24 2025.05.28 Literature Database
Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23 Dataset evaluationModel Selection MethodRisk Assessment Method 2021.11.23 2025.05.28 Literature Database
On the Importance of Difficulty Calibration in Membership Inference Attacks Authors: Lauren Watson, Chuan Guo, Graham Cormode, Alex Sablayrolles | Published: 2021-11-15 | Updated: 2022-04-11 Dataset evaluationMembership InferenceHigh Difficulty Sample 2021.11.15 2025.05.28 Literature Database