Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search

Authors: Ruidong Han, Chao Yang, Siqi Ma, JiangFeng Ma, Cong Sun, Juanru Li, Elisa Bertino | Published: 2021-12-07

Adversarial Machine Learning In Network Intrusion Detection Domain: A Systematic Review

Authors: Huda Ali Alatwi, Charles Morisset | Published: 2021-12-06

Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data

Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06

When the Curious Abandon Honesty: Federated Learning Is Not Private

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2021-12-06 | Updated: 2023-04-12

Beyond Robustness: Resilience Verification of Tree-Based Classifiers

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2021-12-05

Using Static and Dynamic Malware features to perform Malware Ascription

Authors: Jashanpreet Singh Sraw, Keshav Kumar | Published: 2021-12-05

SHAPr: An Efficient and Versatile Membership Privacy Risk Metric for Machine Learning

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2021-12-04 | Updated: 2022-09-05

PhishMatch: A Layered Approach for Effective Detection of Phishing URLs

Authors: Harshal Tupsamudre, Sparsh Jain, Sachin Lodha | Published: 2021-12-04

Node-wise Hardware Trojan Detection Based on Graph Learning

Authors: Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa | Published: 2021-12-04 | Updated: 2022-03-16

Examining Zero-Shot Vulnerability Repair with Large Language Models

Authors: Hammond Pearce, Benjamin Tan, Baleegh Ahmad, Ramesh Karri, Brendan Dolan-Gavitt | Published: 2021-12-03 | Updated: 2022-08-15