Adaptive Hybrid Heterogeneous IDS for 6LoWPAN Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
SoK: The Impact of Unlabelled Data in Cyberthreat Detection Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18 2022.05.18 2025.04.03 文献データベース
Lessons Learned: Defending Against Property Inference Attacks Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09 2022.05.18 2025.04.03 文献データベース
On the (In)security of Peer-to-Peer Decentralized Machine Learning Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10 2022.05.17 2025.04.03 文献データベース
Does Crypto Kill? Relationship between Electricity Consumption Carbon Footprints and Bitcoin Transactions Authors: Altanai Bisht, Arielle Wilson, Zachary Jeffreys, Shadrokh Samavi | Published: 2022-05-16 2022.05.16 2025.04.03 文献データベース
Phishing Detection Leveraging Machine Learning and Deep Learning: A Review Authors: Dinil Mon Divakaran, Adam Oest | Published: 2022-05-16 2022.05.16 2025.04.03 文献データベース
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 2022.05.15 2025.04.03 文献データベース
Representation learning with function call graph transformations for malware open set recognition Authors: Jingyun Jia, Philip K. Chan | Published: 2022-05-13 | Updated: 2022-07-12 2022.05.13 2025.04.03 文献データベース
On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13 2022.05.13 2025.04.03 文献データベース