Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19

Differential Privacy: What is all the noise about?

Authors: Roxana Danger | Published: 2022-05-19

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18

Lessons Learned: Defending Against Property Inference Attacks

Authors: Joshua Stock, Jens Wettlaufer, Daniel Demmler, Hannes Federrath | Published: 2022-05-18 | Updated: 2023-10-09

On the (In)security of Peer-to-Peer Decentralized Machine Learning

Authors: Dario Pasquini, Mathilde Raynal, Carmela Troncoso | Published: 2022-05-17 | Updated: 2023-11-10

Does Crypto Kill? Relationship between Electricity Consumption Carbon Footprints and Bitcoin Transactions

Authors: Altanai Bisht, Arielle Wilson, Zachary Jeffreys, Shadrokh Samavi | Published: 2022-05-16

Phishing Detection Leveraging Machine Learning and Deep Learning: A Review

Authors: Dinil Mon Divakaran, Adam Oest | Published: 2022-05-16