CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU

Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22

Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities

Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22

Robustness of ML-Enhanced IDS to Stealthy Adversaries

Authors: Vance Wong, John Emanuello | Published: 2021-04-21

Dataset Inference: Ownership Resolution in Machine Learning

Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21

Jacobian Regularization for Mitigating Universal Adversarial Perturbations

Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13

Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs

Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20

On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27

Voting Classifier-based Intrusion Detection for IoT Networks

Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad | Published: 2021-04-20 | Updated: 2021-04-25

Adversarial Training for Deep Learning-based Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08