Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13

Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs

Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27

Voting Classifier-based Intrusion Detection for IoT Networks

Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad | Published: 2021-04-20 | Updated: 2021-04-25

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08

Vectorized Secure Evaluation of Decision Forests

Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19

Secure Human Action Recognition by Encrypted Neural Network Inference

Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09

Rethinking Image-Scaling Attacks: The Interplay Between Vulnerabilities in Machine Learning Systems

Authors: Yue Gao, Ilia Shumailov, Kassem Fawaz | Published: 2021-04-18 | Updated: 2022-06-19

Ponzi Scheme Detection in EthereumTransaction Network

Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17