Deep Learning Method

White-Basilisk: A Hybrid Model for Code Vulnerability Detection

Authors: Ioannis Lamprou, Alexander Shevtsov, Ioannis Arapakis, Sotiris Ioannidis | Published: 2025-07-11 | Updated: 2025-07-31
Hybrid Analysis
Deep Learning Method
Vulnerability Analysis

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03
Deep Learning Method
Vulnerability Management
Evaluation Method

Confidential and Protected Disease Classifier using Fully Homomorphic Encryption

Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05
Privacy Protection
Threats of Medical AI
Deep Learning Method

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15
URL analysis techniques
Phishing Detection
Deep Learning Method

Utilizing Deep Learning for Enhancing Network Resilience in Finance

Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18
Network Threat Detection
Intrusion Detection System
Deep Learning Method

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
Model Performance Evaluation
Deep Learning Method
Anomaly Detection Method

Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs)

Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05
Evaluation Methods for PUF
Deep Learning Method
Linear Regression

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20
IoT Device Identification
Cyber Attack
Deep Learning Method