Dissecting Malware in the Wild

Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04

Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh | Published: 2021-11-27

The Geometry of Adversarial Training in Binary Classification

Authors: Leon Bungert, Nicolás García Trillos, Ryan Murray | Published: 2021-11-26 | Updated: 2022-08-01

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files

Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24

xFuzz: Machine Learning Guided Cross-Contract Fuzzing

Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23

Node-Level Differentially Private Graph Neural Networks

Authors: Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, Prateek Jain | Published: 2021-11-23 | Updated: 2022-08-26

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23

A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22

NTD: Non-Transferability Enabled Backdoor Detection

Authors: Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott | Published: 2021-11-22