Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15

Quality Not Quantity: On the Interaction between Dataset Design and Robustness of CLIP

Authors: Thao Nguyen, Gabriel Ilharco, Mitchell Wortsman, Sewoong Oh, Ludwig Schmidt | Published: 2022-08-10 | Updated: 2023-02-01

Explaining Machine Learning DGA Detectors from DNS Traffic Data

Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio | Published: 2022-08-10

Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation

Authors: Tzu-Yun Chien, Chih-Ya Shen | Published: 2022-08-10

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09

Online Malware Classification with System-Wide System Calls in Cloud IaaS

Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09

Robust Machine Learning for Malware Detection over Time

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09

DeepTLS: comprehensive and high-performance feature extraction for encrypted traffic

Authors: Zhi Liu | Published: 2022-08-08