Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18 WatermarkingDataset evaluationTraining Data Extraction Method 2020.12.18 2025.05.28 Literature Database
Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17 Dataset evaluationIntrusion Detection SystemTaxonomy of Attacks 2020.12.17 2025.05.28 Literature Database
Machine Learning for Detecting Data Exfiltration: A Review Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21 Dataset evaluationAttack DetectionRole of Machine Learning 2020.12.17 2025.05.28 Literature Database
GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10 Dataset evaluationTaxonomy of AttacksRole of Machine Learning 2020.12.10 2025.05.28 Literature Database
Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22 Dataset evaluationMachine Learning ApplicationAnomaly Detection Method 2020.10.22 2025.05.28 Literature Database
Certified Distributional Robustness on Smoothed Classifiers Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30 Dataset evaluationRobustness Improvement MethodAdversarial Example 2020.10.21 2025.05.28 Literature Database
Multi-Dimensional Randomized Response Authors: Josep Domingo-Ferrer, Jordi Soria-Comas | Published: 2020-10-21 | Updated: 2020-12-19 Dataset evaluationPrivacy AssuranceMultidimensional Data Analysis 2020.10.21 2025.05.28 Literature Database
Image Obfuscation for Privacy-Preserving Machine Learning Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20 Dataset evaluationData Protection MethodMembership Inference 2020.10.20 2025.05.28 Literature Database
Dos and Don’ts of Machine Learning in Computer Security Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30 Spurious CorrelationDataset evaluationBias 2020.10.19 2025.05.28 Literature Database
BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08 Dataset evaluationBackdoor AttackMachine Learning 2020.10.06 2025.05.28 Literature Database