DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09 Dataset GenerationPerformance EvaluationGenerative Adversarial Network 2022.10.13 2025.05.28 Literature Database
Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19 Model Performance EvaluationImprovement of LearningPerformance Evaluation 2022.09.19 2025.05.28 Literature Database
Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10 IoT Security RisksPerformance EvaluationMachine Learning Method 2022.08.10 2025.05.28 Literature Database
Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09 Performance EvaluationAttack EvaluationMachine Learning Method 2022.08.09 2025.05.28 Literature Database
DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic Authors: Zhi Liu | Published: 2022-08-08 Malware Detection MethodPerformance EvaluationCommunication Analysis 2022.08.08 2025.05.28 Literature Database
LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01 Stability of PredictionsPerformance EvaluationMachine Learning Method 2022.08.05 2025.05.28 Literature Database
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27 Dataset GenerationPerformance EvaluationMachine Learning 2022.07.27 2025.05.28 Literature Database
Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26 Performance EvaluationAttack MethodSpeech Recognition Process 2022.07.26 2025.05.28 Literature Database
On the Role of Generalization in Transferability of Adversarial Examples Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18 Impact of GeneralizationPerformance EvaluationAdversarial Example 2022.06.18 2025.05.28 Literature Database
Deepfake histological images for enhancing digital pathology Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16 AlgorithmThreats of Medical AIPerformance Evaluation 2022.06.16 2025.05.28 Literature Database