Machine Learning Method

Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings

Authors: Mark-Oliver Stehr, Minyoung Kim | Published: 2023-08-23
Clustering methods
Membership Inference
Machine Learning Method

Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service

Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17
Watermarking
Cryptography
Machine Learning Method

Meta-Analysis and Systematic Review for Anomaly Network Intrusion Detection Systems: Detection Methods, Dataset, Validation Methodology, and Challenges

Authors: Ziadoon K. Maseer, Robiah Yusof, Baidaa Al-Bander, Abdu Saif, Qusay Kanaan Kadhim | Published: 2023-08-05 | Updated: 2023-08-11
Intrusion Detection System
Machine Learning Method
Deep Learning Method

Privacy Preserving In-memory Computing Engine

Authors: Haoran Geng, Jianqiao Mo, Dayane Reis, Jonathan Takeshita, Taeho Jung, Brandon Reagen, Michael Niemier, Xiaobo Sharon Hu | Published: 2023-08-04 | Updated: 2023-08-10
Data Protection Method
Data Collection
Machine Learning Method

ExploitFlow, cyber security exploitation routes for Game Theory and AI research in robotics

Authors: Víctor Mayoral-Vilches, Gelei Deng, Yi Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-04
Q-Learning Algorithm
Penetration Testing Applicability
Machine Learning Method

Global Differential Privacy for Distributed Metaverse Healthcare Systems

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20
Watermarking
Data Protection Method
Machine Learning Method

CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection

Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18
Malware Detection Method
Machine Learning Method
Behavior Analysis Method

Discretization-based ensemble model for robust learning in IoT

Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18
Robustness Evaluation
Adversarial Example
Machine Learning Method

Metadata-based Malware Detection on Android using Machine Learning

Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17
Dataset Generation
Malware Detection Method
Machine Learning Method

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15
Dataset Generation
Time Window Analysis
Machine Learning Method