Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 IoC Analysis MethodData Collectionevaluation metrics 2023.06.28 2025.05.28 Literature Database
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17 Experimental ValidationVulnerability detectionevaluation metrics 2023.04.17 2025.05.28 Literature Database
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 Performance EvaluationAttack Detectionevaluation metrics 2022.05.15 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT Authors: Liu Zhang, Zilong Wang | Published: 2022-04-13 Algorithm DesignExperimental Validationevaluation metrics 2022.04.13 2025.05.28 Literature Database
Scalable privacy-preserving cancer type prediction with homomorphic encryption Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12 Privacy ProtectionMatrix Multiplication Methodsevaluation metrics 2022.04.12 2025.05.28 Literature Database
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05 Algorithm DesignData Extraction and Analysisevaluation metrics 2022.04.10 2025.05.28 Literature Database
Cryptocurrency Valuation: An Explainable AI Approach Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08 Token Collection Methodevaluation metricsFinancial Intelligence 2022.01.30 2025.05.28 Literature Database
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24 PoisoningAdversarial Example Detectionevaluation metrics 2021.10.24 2025.05.28 Literature Database
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 WatermarkingTime-Frequency Analysisevaluation metrics 2021.07.25 2025.05.28 Literature Database