Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20

Early detection of the advanced persistent threat attack using performance analysis of deep learning

Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

Authors: Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu | Published: 2020-09-19 | Updated: 2020-11-25

A Framework of Randomized Selection Based Certified Defenses Against Data Poisoning Attacks

Authors: Ruoxin Chen, Jie Li, Chentao Wu, Bin Sheng, Ping Li | Published: 2020-09-18 | Updated: 2020-10-13

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17

On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17

Real-Time Anomaly Detection in Edge Streams

Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25

Byzantine-Robust Variance-Reduced Federated Learning over Distributed Non-i.i.d. Data

Authors: Jie Peng, Zhaoxian Wu, Qing Ling, Tianyi Chen | Published: 2020-09-17 | Updated: 2021-08-28

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04

An Extension of Fano’s Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami | Published: 2020-09-17