Machine Learning for Detecting Data Exfiltration: A Review Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21 Dataset evaluationAttack DetectionRole of Machine Learning 2020.12.17 2025.05.13 Literature Database
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10 Dataset evaluationTaxonomy of AttacksRole of Machine Learning 2020.12.10 2025.05.13 Literature Database
Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22 Dataset evaluationMachine Learning ApplicationAnomaly Detection Method 2020.10.22 2025.05.13 Literature Database
Certified Distributional Robustness on Smoothed Classifiers Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30 Dataset evaluationRobustness Improvement MethodAdversarial Example 2020.10.21 2025.05.13 Literature Database
Multi-Dimensional Randomized Response Authors: Josep Domingo-Ferrer, Jordi Soria-Comas | Published: 2020-10-21 | Updated: 2020-12-19 Dataset evaluationPrivacy AssuranceMultidimensional Data Analysis 2020.10.21 2025.05.13 Literature Database
Image Obfuscation for Privacy-Preserving Machine Learning Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20 Dataset evaluationData Protection MethodMembership Inference 2020.10.20 2025.05.13 Literature Database
Dos and Don’ts of Machine Learning in Computer Security Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30 Spurious CorrelationDataset evaluationBias 2020.10.19 2025.05.13 Literature Database
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08 Dataset evaluationBackdoor AttackMachine Learning 2020.10.06 2025.05.13 Literature Database
Metadata-Based Detection of Child Sexual Abuse Material Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27 Dataset evaluationModel EvaluationMachine Learning 2020.10.05 2025.05.13 Literature Database
Challenges in Forecasting Malicious Events from Incomplete Data Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06 Security AnalysisDataset evaluationVulnerability Assessment Method 2020.04.06 2025.05.13 Literature Database