SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19

Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis

Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22

FLAME: Taming Backdoors in Federated Learning (Extended Version 1)

Authors: Thien Duc Nguyen, Phillip Rieger, Huili Chen, Hossein Yalame, Helen Möllering, Hossein Fereidooni, Samuel Marchal, Markus Miettinen, Azalia Mirhoseini, Shaza Zeitouni, Farinaz Koushanfar, Ahmad-Reza Sadeghi, Thomas Schneider | Published: 2021-01-06 | Updated: 2023-08-05

Local Competition and Stochasticity for Adversarial Robustness in Deep Learning

Authors: Konstantinos P. Panousis, Sotirios Chatzis, Antonios Alexos, Sergios Theodoridis | Published: 2021-01-04 | Updated: 2021-03-29

Active Learning Under Malicious Mislabeling and Poisoning Attacks

Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30

With False Friends Like These, Who Can Notice Mistakes?

Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13

Phishing Detection through Email Embeddings

Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28

Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection

Authors: Mir Hassan, Chen Jincai, Adnan Iftekhar, Adnan Shehzad, Xiaohui Cui | Published: 2020-12-28

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26