Secure Aggregation for Federated Learning in Flower

Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12

Privacy-Preserving Distributed Machine Learning Made Faster

Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09

Btech thesis report on adversarial attack detection and purification of adverserially attacked images

Authors: Dvij Kalaria | Published: 2022-05-09

On Generalisability of Machine Learning-based Network Intrusion Detection Systems

Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09

A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection

Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing

Authors: Yan Long, Chen Yan, Shilin Xiao, Shivan Prasad, Wenyuan Xu, Kevin Fu | Published: 2022-05-08 | Updated: 2023-01-16

Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection

Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08