SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.28 Literature Database
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22 Blockchain TechnologyMachine Learning MethodLinear Model 2021.01.07 2025.05.28 Literature Database
Stack-based Buffer Overflow Detection using Recurrent Neural Networks Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30 Data Generation MethodMachine Learning MethodResearch Methodology 2020.12.30 2025.05.28 Literature Database
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09 Performance EvaluationMachine Learning MethodFeature Extraction Method 2020.12.09 2025.05.28 Literature Database
Generalized Insider Attack Detection Implementation using NetFlow Data Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27 Data Flow AnalysisAttack DetectionMachine Learning Method 2020.10.27 2025.05.28 Literature Database
DualNet: Locate Then Detect Effective Payload with Deep Attention Network Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23 PoisoningMachine Learning MethodFeature Importance Analysis 2020.10.23 2025.05.28 Literature Database
Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22 Malware DetectionMachine Learning MethodWeight Update Method 2020.10.22 2025.05.28 Literature Database
Multi-Step Adversarial Perturbations on Recommender Systems Embeddings Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03 Robustness EvaluationAdversarial Perturbation TechniquesMachine Learning Method 2020.10.03 2025.05.28 Literature Database
Federated Transfer Learning: concept and applications Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06 Privacy Protection MethodInformation-Theoretic PrivacyMachine Learning Method 2020.09.26 2025.05.28 Literature Database
Black Box to White Box: Discover Model Characteristics Based on Strategic Probing Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07 Adversarial Attack MethodsMachine Learning MethodImage Processing 2020.09.07 2025.05.28 Literature Database