On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities

Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12

AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning

Authors: Ghada Almashaqbeh, Zahra Ghodsi | Published: 2023-06-12

Augmenting Greybox Fuzzing with Generative AI

Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11

Efficient Skip Connections Realization for Secure Inference on Encrypted Data

Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11

UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI

Authors: Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic | Published: 2023-06-11 | Updated: 2023-06-13

Zero-Day Threats Detection for Critical Infrastructures

Authors: Mike Nkongolo, Mahmut Tokmak | Published: 2023-06-10

Differentially private sliced inverse regression in the federated paradigm

Authors: Shuaida He, Jiarui Zhang, Xin Chen | Published: 2023-06-10 | Updated: 2023-08-10

Early Malware Detection and Next-Action Prediction

Authors: Zahra Jamadi, Amir G. Aghdam | Published: 2023-06-09

A Survey on Cross-Architectural IoT Malware Threat Hunting

Authors: Anandharaju Durai Raju, Ibrahim Abualhaol, Ronnie Salvador Giagone, Yang Zhou, Shengqiang Huang | Published: 2023-06-09