RAIDER: Reinforcement-aided Spear Phishing Detector

Authors: Keelan Evans, Alsharif Abuadbba, Tingmin Wu, Kristen Moore, Mohiuddin Ahmed, Ganna Pogrebna, Surya Nepal, Mike Johnstone | Published: 2021-05-17 | Updated: 2023-01-03

Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics

Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16

Undistillable: Making A Nasty Teacher That CANNOT teach students

Authors: Haoyu Ma, Tianlong Chen, Ting-Kuei Hu, Chenyu You, Xiaohui Xie, Zhangyang Wang | Published: 2021-05-16

Real-time Detection of Practical Universal Adversarial Perturbations

Authors: Kenneth T. Co, Luis Muñoz-González, Leslie Kanthan, Emil C. Lupu | Published: 2021-05-16 | Updated: 2021-05-22

Cybersecurity Anomaly Detection in Adversarial Environments

Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02

Privacy Inference Attacks and Defenses in Cloud-based Deep Neural Network: A Survey

Authors: Xiaoyu Zhang, Chao Chen, Yi Xie, Xiaofeng Chen, Jun Zhang, Yang Xiang | Published: 2021-05-13

PassFlow: Guessing Passwords with Generative Flows

Authors: Giulio Pagnotta, Dorjan Hitaj, Fabio De Gaspari, Luigi V. Mancini | Published: 2021-05-13 | Updated: 2021-12-14

The FeatureCloud AI Store for Federated Learning in Biomedicine and Beyond

Authors: Julian Matschinske, Julian Späth, Reza Nasirigerdeh, Reihaneh Torkzadehmahani, Anne Hartebrodt, Balázs Orbán, Sándor Fejér, Olga Zolotareva, Mohammad Bakhtiari, Béla Bihari, Marcus Bloice, Nina C Donner, Walid Fdhila, Tobias Frisch, Anne-Christin Hauschild, Dominik Heider, Andreas Holzinger, Walter Hötzendorfer, Jan Hospes, Tim Kacprowski, Markus Kastelitz, Markus List, Rudolf Mayer, Mónika Moga, Heimo Müller, Anastasia Pustozerova, Richard Röttger, Anna Saranti, Harald HHW Schmidt, Christof Tschohl, Nina K Wenke, Jan Baumbach | Published: 2021-05-12

An Efficient Learning Framework For Federated XGBoost Using Secret Sharing And Distributed Optimization

Authors: Lunchen Xie, Jiaqi Liu, Songtao Lu, Tsung-hui Chang, Qingjiang Shi | Published: 2021-05-12

ADASYN-Random Forest Based Intrusion Detection Model

Authors: Zhewei Chen, Wenwen Yu, Linyue Zhou | Published: 2021-05-10 | Updated: 2022-04-14