DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

Authors: Mehmet Sinan Inci, Thomas Eisenbarth, Berk Sunar | Published: 2018-08-03 | Updated: 2020-04-23

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03

Cyber Threat Intelligence : Challenges and Opportunities

Authors: Mauro Conti, Ali Dehghantanha, Tooska Dargahi | Published: 2018-08-03

Dynamic Multi-level Privilege Control in Behavior-based Implicit Authentication Systems Leveraging Mobile Devices

Authors: Yingyuan Yang, Xueli Huang, Yanhui Guo, Jinyuan Stella Sun | Published: 2018-08-02 | Updated: 2021-04-15

MLCapsule: Guarded Offline Deployment of Machine Learning as a Service

Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06

Tackling Android Stego Apps in the Wild

Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01

Cognitive Techniques for Early Detection of Cybersecurity Events

Authors: Sandeep Narayanan, Ashwinkumar Ganesan, Karuna Joshi, Tim Oates, Anupam Joshi, Tim Finin | Published: 2018-08-01

Subsampled Rényi Differential Privacy and Analytical Moments Accountant

Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29