Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Authors: James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen | Published: 2021-12-03

Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity

Authors: Honglu Jiang, Yifeng Gao, S M Sarwar, Luis GarzaPerez, Mahmudul Robin | Published: 2021-12-03

FP-Radar: Longitudinal Measurement and Early Detection of Browser Fingerprinting

Authors: Pouneh Nikkhah Bahrami, Umar Iqbal, Zubair Shafiq | Published: 2021-12-03 | Updated: 2021-12-14

A tool to support the investigation and visualization of cyber and/or physical incidents

Authors: Inês Macedo, Sinan Wanous, Nuno Oliveira, Orlando Sousa, Isabel Praça | Published: 2021-12-02

Improving the Reliability of Network Intrusion Detection Systems through Dataset Integration

Authors: Roberto Magán-Carrión, Daniel Urda, Ignacio Díaz-Cano, Bernabé Dorronsoro | Published: 2021-12-02

Improving Differentially Private SGD via Randomly Sparsified Gradients

Authors: Junyi Zhu, Matthew B. Blaschko | Published: 2021-12-01 | Updated: 2023-06-28

Adversarial Attacks Against Deep Generative Models on Data: A Survey

Authors: Hui Sun, Tianqing Zhu, Zhiqiu Zhang, Dawei Jin. Ping Xiong, Wanlei Zhou | Published: 2021-12-01

FROB: Few-shot ROBust Model for Classification and Out-of-Distribution Detection

Authors: Nikolaos Dionelis, Mehrdad Yaghoobi, Sotirios A. Tsaftaris | Published: 2021-11-30 | Updated: 2022-02-02

Benchmark Static API Call Datasets for Malware Family Classification

Authors: Berkant Düzgün, Aykut Çayır, Ferhat Demirkıran, Ceyda Nur Kahya, Buket Gençaydın, Hasan Dağ | Published: 2021-11-30 | Updated: 2022-08-04

Living-Off-The-Land Command Detection Using Active Learning

Authors: Talha Ongun, Jack W. Stokes, Jonathan Bar Or, Ke Tian, Farid Tajaddodianfar, Joshua Neil, Christian Seifert, Alina Oprea, John C. Platt | Published: 2021-11-30