Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT Authors: Liu Zhang, Zilong Wang | Published: 2022-04-13 Algorithm DesignExperimental Validationevaluation metrics 2022.04.13 2025.05.28 Literature Database
Scalable privacy-preserving cancer type prediction with homomorphic encryption Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12 Privacy ProtectionMatrix Multiplication Methodsevaluation metrics 2022.04.12 2025.05.28 Literature Database
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05 Algorithm DesignData Extraction and Analysisevaluation metrics 2022.04.10 2025.05.28 Literature Database
Cryptocurrency Valuation: An Explainable AI Approach Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08 Token Collection Methodevaluation metricsFinancial Intelligence 2022.01.30 2025.05.28 Literature Database
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24 PoisoningAdversarial Example Detectionevaluation metrics 2021.10.24 2025.05.28 Literature Database
Wavelet Selection and Employment for Side-Channel Disassembly Authors: Random Gwinn, Mark A. Matties, Aviel D. Rubin | Published: 2021-07-25 WatermarkingTime-Frequency Analysisevaluation metrics 2021.07.25 2025.05.28 Literature Database
On the impossibility of non-trivial accuracy under fairness constraints Authors: Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia | Published: 2021-07-14 | Updated: 2021-11-23 Data Privacy AssessmentModel Design and Accuracyevaluation metrics 2021.07.14 2025.05.28 Literature Database
ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23 Multi-output ModelVulnerability detectionevaluation metrics 2021.03.23 2025.05.28 Literature Database
Utilising Flow Aggregation to Classify Benign Imitating Attacks Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06 Flow Aggregation MethodAttack Detectionevaluation metrics 2021.03.06 2025.05.28 Literature Database