Deep Learning Method

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning

Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06
Backdoor Detection
Privacy Protection
Deep Learning Method

MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection

Authors: Paulo Mendes, Eva Maia, Isabel Praça | Published: 2025-07-23 | Updated: 2025-11-06
Dataset Integration
Information Security
Deep Learning Method

White-Basilisk: A Hybrid Model for Code Vulnerability Detection

Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31
Hybrid Analysis
Deep Learning Method
Vulnerability Analysis

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03
Deep Learning Method
Vulnerability Management
Evaluation Method

Confidential and Protected Disease Classifier using Fully Homomorphic Encryption

Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05
Privacy Protection
Threats of Medical AI
Deep Learning Method

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15
URL analysis techniques
Phishing Detection
Deep Learning Method

Utilizing Deep Learning for Enhancing Network Resilience in Finance

Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18
Network Threat Detection
Intrusion Detection System
Deep Learning Method

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
Model Performance Evaluation
Deep Learning Method
Anomaly Detection Method

Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs)

Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05
Evaluation Methods for PUF
Deep Learning Method
Linear Regression

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method