Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18

Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04

A Multiagent CyberBattleSim for RL Cyber Operation Agents

Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03

On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach

Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07

Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03

MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks

Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09