Avast-CTU Public CAPE Dataset

Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol | Published: 2022-09-06

RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data

Authors: Chathurika S. Wickramasinghe, Daniel L. Marino, Harindra S. Mavikumbure, Victor Cobilean, Timothy D. Pennington, Benny J. Varghese, Craig Rieger, Milos Manic | Published: 2022-09-05

“Is your explanation stable?”: A Robustness Evaluation Framework for Feature Attribution

Authors: Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang | Published: 2022-09-05

Beyond Random Split for Assessing Statistical Model Performance

Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta | Published: 2022-09-04

Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference

Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu | Published: 2022-09-04

PhishClone: Measuring the Efficacy of Cloning Evasion Attacks

Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere | Published: 2022-09-04

Data Provenance via Differential Auditing

Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04

Phishing URL Detection: A Network-based Approach Robust to Evasion

Authors: Taeri Kim, Noseong Park, Jiwon Hong, Sang-Wook Kim | Published: 2022-09-03

Group Property Inference Attacks Against Graph Neural Networks

Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02