CoAP-DoS: An IoT Network Intrusion Dataset

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik | Published: 2022-06-29

How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection

Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28

Parallel Instance Filtering for Malware Detection

Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28

Improving Correlation Capture in Generating Imbalanced Data using Differentially Private Conditional GANs

Authors: Chang Sun, Johan van Soest, Michel Dumontier | Published: 2022-06-28

Multifamily Malware Models

Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27

Adversarially Robust PAC Learnability of Real-Valued Functions

Authors: Idan Attias, Steve Hanneke | Published: 2022-06-26 | Updated: 2024-05-05

Malware Detection and Prevention using Artificial Intelligence Techniques

Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25

Using Autoencoders on Differentially Private Federated Learning GANs

Authors: Gregor Schram, Rui Wang, Kaitai Liang | Published: 2022-06-24

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11