Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Authors: Zeki Bilgin | Published: 2021-05-07

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04

A Review of Confidentiality Threats Against Embedded Neural Network Models

Authors: Raphaël Joud, Pierre-Alain Moellic, Rémi Bernhard, Jean-Baptiste Rigaud | Published: 2021-05-04

Fast, Reliable, and Secure Drone Communication: A Comprehensive Survey

Authors: Vikas Hassija, Vinay Chamola, Adhar Agrawal, Adit Goyal, Nguyen Cong Luong, Dusit Niyato, F. Richard Yu, Mohsen Guizani | Published: 2021-05-04

Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning with SGX

Authors: Chengliang Zhang, Junzhe Xia, Baichen Yang, Huancheng Puyang, Wei Wang, Ruichuan Chen, Istemi Ekin Akkus, Paarijaat Aditya, Feng Yan | Published: 2021-05-04 | Updated: 2021-11-08

Quantifying the Tradeoff Between Cybersecurity and Location Privacy

Authors: Dajiang Suo, M. Elena Renda, Jinhua Zhao | Published: 2021-05-04 | Updated: 2021-12-10

GRNN: Generative Regression Neural Network — A Data Leakage Attack for Federated Learning

Authors: Hanchi Ren, Jingjing Deng, Xianghua Xie | Published: 2021-05-02 | Updated: 2022-09-12