Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing

Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29

Evaluating Privacy-Preserving Machine Learning in Critical Infrastructures: A Case Study on Time-Series Classification

Authors: Dominique Mercier, Adriano Lucieri, Mohsin Munir, Andreas Dengel, Sheraz Ahmed | Published: 2021-11-29

MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment

Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12

Statically Detecting Adversarial Malware through Randomised Chaining

Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04

Dissecting Malware in the Wild

Authors: Hamish Spencer, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04

Deep Q-Learning based Reinforcement Learning Approach for Network Intrusion Detection

Authors: Hooman Alavizadeh, Julian Jang-Jaccard, Hootan Alavizadeh | Published: 2021-11-27

The Geometry of Adversarial Training in Binary Classification

Authors: Leon Bungert, Nicolás García Trillos, Ryan Murray | Published: 2021-11-26 | Updated: 2022-08-01

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files

Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24

xFuzz: Machine Learning Guided Cross-Contract Fuzzing

Authors: Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Published: 2021-11-24 | Updated: 2022-06-30

Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the Age of AI-NIDS

Authors: Christian Schroeder de Witt, Yongchao Huang, Philip H. S. Torr, Martin Strohmeier | Published: 2021-11-23