Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT

Authors: Joseph Rose, Matthew Swann, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis | Published: 2021-09-06

Statistical Privacy Guarantees of Machine Learning Preprocessing Techniques

Authors: Ashly Lau, Jonathan Passerat-Palmbach | Published: 2021-09-06

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain

Authors: Richard Brown, Gueltoum Bendiab, Stavros Shiaeles, Bogdan Ghita | Published: 2021-09-06

Detection of Insider Threats using Artificial Intelligence and Visualisation

Authors: Vasileios Koutsouvelis, Stavros Shiaeles, Bogdan Ghita, Gueltoum Bendiab | Published: 2021-09-06

Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

Authors: Aryan Verma | Published: 2021-09-06

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05

Predicting Process Name from Network Data

Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03

CrypTen: Secure Multi-Party Computation Meets Machine Learning

Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03

Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange

Authors: Pengcheng Xia, Haoyu wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Published: 2021-09-01 | Updated: 2021-11-11