Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17 Backdoor AttackMembership InferenceVulnerability Analysis 2022.01.12 2025.05.28 Literature Database
PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24 Feature EngineeringVulnerability AnalysisCommunication Analysis 2021.12.27 2025.05.28 Literature Database
Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07 Code Change AnalysisFeature Selection MethodVulnerability Analysis 2021.05.07 2025.05.28 Literature Database
Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction Authors: Zeki Bilgin | Published: 2021-05-07 Code Change AnalysisToken Distribution AnalysisVulnerability Analysis 2021.05.07 2025.05.28 Literature Database
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06 Class ImbalanceData PreprocessingVulnerability Analysis 2021.05.06 2025.05.28 Literature Database
An Overview of Laser Injection against Embedded Neural Network Models Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04 Hardware SecurityVulnerability of Adversarial ExamplesVulnerability Analysis 2021.05.04 2025.05.28 Literature Database
Who’s Afraid of Adversarial Transferability? Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06 Adversarial ExampleVulnerability of Adversarial ExamplesVulnerability Analysis 2021.05.02 2025.05.28 Literature Database
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 Backdoor AttackRisks of Model CompressionVulnerability Analysis 2021.04.30 2025.05.28 Literature Database
Automated Software Vulnerability Assessment with Concept Drift Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21 Performance EvaluationConcept DriftVulnerability Analysis 2021.03.21 2025.05.28 Literature Database
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06 Model Performance EvaluationAdversarial attackVulnerability Analysis 2021.03.10 2025.05.28 Literature Database