Email Summarization to Assist Users in Phishing Identification

Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24

MERLIN — Malware Evasion with Reinforcement LearnINg

Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki | Published: 2022-03-23

Ethereum Fraud Detection with Heterogeneous Graph Neural Networks

Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis

Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02

FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic

Authors: Sankha Das | Published: 2022-03-21

Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap

Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21

RareGAN: Generating Samples for Rare Classes

Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20