Enterprise API Security and GDPR Compliance: Design and Implementation Perspective Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17 API SecurityPrivacy Design PrinciplesInformation Security 2019.09.17 2025.05.28 Literature Database
Road Context-aware Intrusion Detection System for Autonomous Cars Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02 Intrusion Detection SystemInformation SecurityDeep Learning Method 2019.08.02 2025.05.28 Literature Database
Black-box Adversarial ML Attack on Modulation Classification Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01 Information SecurityAdversarial LearningDeep Learning Method 2019.08.01 2025.05.28 Literature Database
The Curious Case of Machine Learning In Malware Detection Authors: Sherif Saad, William Briguglio, Haytham Elmiligi | Published: 2019-05-18 Malware Detection MethodInformation SecurityAdaptive Retraining Mechanism 2019.05.18 2025.05.28 Literature Database
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20 Model EvaluationAd Blocking SystemInformation Security 2019.05.17 2025.05.28 Literature Database
Machine Learning in Cyber-Security – Problems, Challenges and Data Sets Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22 Data CollectionMalware Detection MethodInformation Security 2018.12.19 2025.05.28 Literature Database
Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments Authors: Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka | Published: 2018-10-23 Multi-Class ClassificationInformation SecurityAttack Detection 2018.10.23 2025.05.28 Literature Database
The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30 Program AnalysisDynamic AnalysisInformation Security 2018.05.28 2025.05.28 Literature Database
Phocas: dimensional Byzantine-resilient stochastic gradient descent Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-05-23 Byzantine Attack CountermeasuresInformation SecurityLoss Function 2018.05.23 2025.05.28 Literature Database
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18 Certified RobustnessInformation SecurityAdversarial Attack Detection 2018.05.17 2025.05.28 Literature Database