PhishOut: Effective Phishing Detection Using Selected Features

Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi | Published: 2020-04-21

Scalable and Secure Architecture for Distributed IoT Systems

Authors: Najmeddine Dhieb, Hakim Ghazzai, Hichem Besbes, Yehia Massoud | Published: 2020-04-20

Headless Horseman: Adversarial Attacks on Transfer Learning Models

Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20

Local Differential Privacy based Federated Learning for Internet of Things

Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22

Data Poisoning Attacks on Federated Machine Learning

Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19

Protecting Classifiers From Attacks. A Bayesian Approach

Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18

On the (Un)Reliability of Privacy Policies in Android Apps

Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12

Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems

Authors: Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Genshe Chen, Dan Shen | Published: 2020-04-16

Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms

Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15