Information Security

Universal Approximation with Certified Networks

Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14
Convergence Analysis
Information Security
Machine Learning Technology

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21
Privacy Protection Mechanism
Information Security
Machine Learning Application

Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17
API Security
Privacy Design Principles
Information Security

Road Context-aware Intrusion Detection System for Autonomous Cars

Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02
Intrusion Detection System
Information Security
Deep Learning Method

Black-box Adversarial ML Attack on Modulation Classification

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01
Information Security
Adversarial Learning
Deep Learning Method

The Curious Case of Machine Learning In Malware Detection

Authors: Sherif Saad, William Briguglio, Haytham Elmiligi | Published: 2019-05-18
Malware Detection Method
Information Security
Adaptive Retraining Mechanism

Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning

Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20
Model Evaluation
Ad Blocking System
Information Security

Machine Learning in Cyber-Security – Problems, Challenges and Data Sets

Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22
Data Collection
Malware Detection Method
Information Security

Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments

Authors: Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka | Published: 2018-10-23
Multi-Class Classification
Information Security
Attack Detection

The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30
Program Analysis
Dynamic Analysis
Information Security