Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14

A Chatbot for Information Security

Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02

One-Pixel Attack Deceives Computer-Assisted Diagnosis of Cancer

Authors: Joni Korpihalkola, Tuomo Sipola, Samir Puuska, Tero Kokkonen | Published: 2020-12-01 | Updated: 2021-11-02

Towards a Universal Features Set for IoT Botnet Attacks Detection

Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01

TransMIA: Membership Inference Attacks Using Transfer Shadow Training

Authors: Seira Hidano, Takao Murakami, Yusuke Kawamoto | Published: 2020-11-30 | Updated: 2021-04-23

Gradient Sparsification Can Improve Performance of Differentially-Private Convex Machine Learning

Authors: Farhad Farokhi | Published: 2020-11-30 | Updated: 2020-12-01

Voting based ensemble improves robustness of defensive models

Authors: Devvrit, Minhao Cheng, Cho-Jui Hsieh, Inderjit Dhillon | Published: 2020-11-28

InstaHide’s Sample Complexity When Mixing Two Private Images

Authors: Baihe Huang, Zhao Song, Runzhou Tao, Junze Yin, Ruizhe Zhang, Danyang Zhuo | Published: 2020-11-24 | Updated: 2024-02-06