ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11

Towards Plausible Differentially Private ADMM Based Distributed Machine Learning

Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks

Authors: Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-08-11 | Updated: 2020-12-09

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03