CAFE-GB: Scalable and Stable Feature Selection for Malware Detection via Chunk-wise Aggregated Gradient Boosting Authors: Ajvad Haneef K, Karan Kuwar Singh, Madhu Kumar S D | Published: 2026-01-22 Machine Learning AlgorithmFeature Selection MethodInterpretability 2026.01.22 2026.01.24 Literature Database
Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP Authors: Elodie Mutombo Ngoie, Mike Nkongolo Wa Nkongolo, Peace Azugo, Mahmut Tokmak | Published: 2025-11-17 Membership InferenceDeep Learning-Based IDSFeature Selection Method 2025.11.17 2025.11.19 Literature Database
BarkBeetle: Stealing Decision Tree Models with Fault Injection Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09 Model Extraction AttackAdversarial attackFeature Selection Method 2025.07.09 2025.07.11 Literature Database
Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça | Published: 2024-04-05 Model Performance EvaluationTime-Related FeaturesFeature Selection Method 2024.04.05 2025.05.27 Literature Database
Improving behavior based authentication against adversarial attack using XAI Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10 Adversarial TrainingFeature Selection MethodDefense Method 2024.02.26 2025.05.27 Literature Database
Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective Authors: Yue Xing, Xiaofeng Lin, Qifan Song, Yi Xu, Belinda Zeng, Guang Cheng | Published: 2024-01-26 PoisoningAdversarial TrainingFeature Selection Method 2024.01.26 2025.05.27 Literature Database
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-10-17 Model Performance EvaluationTime-Related FeaturesFeature Selection Method 2023.10.17 2025.05.27 Literature Database
On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais | Published: 2023-10-14 Malicious Package DetectionAttack EvaluationFeature Selection Method 2023.10.14 2025.05.28 Literature Database
Towards Code Watermarking with Dual-Channel Transformations Authors: Borui Yang, Wei Li, Liyao Xiang, Bo Li | Published: 2023-09-02 | Updated: 2024-01-02 Data Protection MethodFeature Selection MethodWatermark Robustness 2023.09.02 2025.05.28 Literature Database
A Feature Set of Small Size for the PDF Malware Detection Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10 WatermarkingModel Performance EvaluationFeature Selection Method 2023.08.09 2025.05.28 Literature Database