Cryptographic ransomware encryption detection: Survey

Authors: Kenan Begovic, Abdulaziz Al-Ali, Qutaibah Malluhi | Published: 2023-06-21

Universal adversarial perturbations for multiple classification tasks with quantum classifiers

Authors: Yun-Zhong Qiu | Published: 2023-06-21 | Updated: 2023-10-25

Adversarial Training Should Be Cast as a Non-Zero-Sum Game

Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24

Differentially Private Over-the-Air Federated Learning Over MIMO Fading Channels

Authors: Hang Liu, Jia Yan, Ying-Jun Angela Zhang | Published: 2023-06-19 | Updated: 2023-12-25

Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids

Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17

Bkd-FedGNN: A Benchmark for Classification Backdoor Attacks on Federated Graph Neural Network

Authors: Fan Liu, Siqi Lai, Yansong Ning, Hao Liu | Published: 2023-06-17

Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses

Authors: Mohamed Amine Ferrag, Othmane Friha, Burak Kantarci, Norbert Tihanyi, Lucas Cordeiro, Merouane Debbah, Djallel Hamouda, Muna Al-Hawawreh, Kim-Kwang Raymond Choo | Published: 2023-06-17 | Updated: 2024-02-08

Evaluating Superhuman Models with Consistency Checks

Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19

You Don’t Need Robust Machine Learning to Manage Adversarial Attack Risks

Authors: Edward Raff, Michel Benaroch, Andrew L. Farris | Published: 2023-06-16