Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles Authors: Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman | Published: 2024-01-02 GNSS SecurityLSTM Model Performance EvaluationVulnerabilities in Autonomous Driving Technology 2024.01.02 2025.05.27 Literature Database
Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 LSTM Model Performance EvaluationWatermarkingMalware Classification 2023.12.02 2025.05.28 Literature Database
Application of BadNets in Spam Filters Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18 LSTM Model Performance EvaluationBackdoor AttackImprovement of Learning 2023.07.18 2025.05.28 Literature Database
Population Expansion for Training Language Models with Private Federated Learning Authors: Tatsuki Koga, Congzheng Song, Martin Pelikan, Mona Chitnis | Published: 2023-07-14 LSTM Model Performance EvaluationImprovement of LearningFederated Learning 2023.07.14 2025.05.28 Literature Database
Intrusion Detection: A Deep Learning Approach Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13 LSTM Model Performance EvaluationClassification Pattern AnalysisAutomated Intrusion Detection System 2023.06.13 2025.05.28 Literature Database
Early Malware Detection and Next-Action Prediction Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09 LSTM Model Performance EvaluationCyber AttackClassification of Malicious Actors 2023.06.09 2025.05.28 Literature Database
MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02 LSTM Model Performance EvaluationMalware DetectionMachine Learning Method 2023.04.02 2025.05.28 Literature Database
Automated email Generation for Targeted Attacks using Natural Language Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19 LSTM Model Performance EvaluationTraining MethodPhishing Detection 2019.08.19 2025.05.28 Literature Database
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09 LSTM Model Performance EvaluationApplication of Text ClassificationFeature Engineering 2019.08.09 2025.05.28 Literature Database