Machine Learning Technology

Ransomware Detection and Classification Strategies

Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10
Network Threat Detection
Malware Detection Method
Machine Learning Technology

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
Security Analysis
Performance Evaluation
Machine Learning Technology

IoT Federated Blockchain Learning at the Edge

Authors: James Calo, Benny Lo | Published: 2023-04-06
Cloud Computing
Threats of Medical AI
Machine Learning Technology

Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids

Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30
Automation of Cybersecurity
Adversarial Example
Machine Learning Technology

How many dimensions are required to find an adversarial example?

Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11
Convergence Property
Adversarial Example
Machine Learning Technology

Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense

Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18
DNN IP Protection Method
Prompt Injection
Machine Learning Technology

A survey on hardware-based malware detection approaches

Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18
Challenges of HPC
Cybersecurity
Machine Learning Technology

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03
Cybersecurity
Membership Inference
Machine Learning Technology

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17
Data Collection
Program Analysis
Machine Learning Technology

A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis

Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15
Performance Evaluation Metrics
Machine Learning Technology
Feature Selection Method