Android Malware Clustering using Community Detection on Android Packages Similarity Network Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Published: 2020-05-12 Community DetectionMalware Propagation MeansComputational Efficiency 2020.05.12 2025.05.28 Literature Database
DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi | Published: 2020-04-12 TEE ImplementationPrivacy IssuesComputational Efficiency 2020.04.12 2025.05.28 Literature Database
Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07 Competitive Cooperative SystemsComputational EfficiencyDefense Method 2020.04.07 2025.05.28 Literature Database
Differentially Private Naive Bayes Classifier using Smooth Sensitivity Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19 Privacy Protection MethodMachine Learning ApplicationComputational Efficiency 2020.03.31 2025.05.28 Literature Database
Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent Authors: Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin | Published: 2020-02-18 Factors of Performance DegradationAdversarial Attack DetectionComputational Efficiency 2020.02.18 2025.05.28 Literature Database
On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18 Adversarial ExampleAdversarial Attack DetectionComputational Efficiency 2020.02.18 2025.05.28 Literature Database
Byzantine-Resilient Stochastic Gradient Descent for Distributed Learning: A Lipschitz-Inspired Coordinate-wise Median Approach Authors: Haibo Yang, Xin Zhang, Minghong Fang, Jia Liu | Published: 2019-09-10 Byzantine Attack CountermeasuresConvergence GuaranteeComputational Efficiency 2019.09.10 2025.05.28 Literature Database
SHE: A Fast and Accurate Deep Neural Network for Encrypted Data Authors: Qian Lou, Lei Jiang | Published: 2019-06-01 | Updated: 2019-11-16 Dataset AnalysisDeep Learning TechnologyComputational Efficiency 2019.06.01 2025.05.28 Literature Database