Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 Network Threat DetectionMalware Detection MethodMachine Learning Technology 2023.04.10 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
IoT Federated Blockchain Learning at the Edge Authors: James Calo, Benny Lo | Published: 2023-04-06 Cloud ComputingThreats of Medical AIMachine Learning Technology 2023.04.06 2025.05.28 Literature Database
Machine-learned Adversarial Attacks against Fault Prediction Systems in Smart Electrical Grids Authors: Carmelo Ardito, Yashar Deldjoo, Tommaso Di Noia, Eugenio Di Sciascio, Fatemeh Nazary, Giovanni Servedio | Published: 2023-03-28 | Updated: 2024-01-30 Automation of CybersecurityAdversarial ExampleMachine Learning Technology 2023.03.28 2025.05.28 Literature Database
How many dimensions are required to find an adversarial example? Authors: Charles Godfrey, Henry Kvinge, Elise Bishoff, Myles Mckay, Davis Brown, Tim Doster, Eleanor Byler | Published: 2023-03-24 | Updated: 2023-04-11 Convergence PropertyAdversarial ExampleMachine Learning Technology 2023.03.24 2025.05.28 Literature Database
Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18 DNN IP Protection MethodPrompt InjectionMachine Learning Technology 2023.03.23 2025.05.28 Literature Database
A survey on hardware-based malware detection approaches Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18 Challenges of HPCCybersecurityMachine Learning Technology 2023.03.22 2025.05.28 Literature Database
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03 CybersecurityMembership InferenceMachine Learning Technology 2023.03.20 2025.05.28 Literature Database
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 Data CollectionProgram AnalysisMachine Learning Technology 2023.01.17 2025.05.28 Literature Database
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15 Performance Evaluation MetricsMachine Learning TechnologyFeature Selection Method 2023.01.15 2025.05.28 Literature Database