Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24

Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23

Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs

Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26

Privacy Amplification Via Bernoulli Sampling

Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20