The missing link in network intrusion detection: Taking AI/ML research efforts to users

K Dietz, M Mühlhauser, J Kögel, S Schwinger… - IEEE …, 2024 - ieeexplore.ieee.org
Intrusion Detection Systems (IDS) tackle the challenging task of detecting network attacks as
fast as possible. As this is getting more complex in modern enterprise networks, Artificial …

" Better Be Computer or I'm Dumb": A Large-Scale Evaluation of Humans as Audio Deepfake Detectors

K Warren, T Tucker, A Crowder, D Olszewski… - Proceedings of the …, 2024 - dl.acm.org
Audio deepfakes represent a rising threat to trust in our daily communications. In response
to this, the research community has developed a wide array of detection techniques aimed …

Wildest Dreams: Reproducible Research in Privacy-preserving Neural Network Training

T Khan, M Budzys, K Nguyen, A Michalas - arxiv preprint arxiv …, 2024 - arxiv.org
Machine Learning (ML), addresses a multitude of complex issues in multiple disciplines,
including social sciences, finance, and medical research. ML models require substantial …

[HTML][HTML] NeuroIDBench: An open-source benchmark framework for the standardization of methodology in brainwave-based authentication research

AK Chaurasia, M Fallahi, T Strufe, P Terhörst… - Journal of Information …, 2024 - Elsevier
Biometric systems based on brain activity have been proposed as an alternative to
passwords or to complement current authentication techniques. By leveraging the unique …

SoK: On the offensive potential of AI

SL Schröer, G Apruzzese, S Human, P Laskov… - arxiv preprint arxiv …, 2024 - arxiv.org
Our society increasingly benefits from Artificial Intelligence (AI). Unfortunately, more and
more evidence shows that AI is also used for offensive purposes. Prior works have revealed …

Verifiable evaluations of machine learning models using zkSNARKs

T South, A Camuto, S Jain, S Nguyen, R Mahari… - arxiv preprint arxiv …, 2024 - arxiv.org
In a world of increasing closed-source commercial machine learning models, model
evaluations from developers must be taken at face value. These benchmark results-whether …

Attacking learning-based models in smart grids: Current challenges and new frontiers

G Sánchez, G Elbez, V Hagenmeyer - Proceedings of the 15th ACM …, 2024 - dl.acm.org
Learning-based components applied to a plethora of use cases within smart grids are
already a reality. These methods will undoubtedly play a key role in future energy systems …

Transparency in Usable Privacy and Security Research: Scholars' Perspectives, Practices, and Recommendations

J Klemmer, J Schmüser, BM Lowens, F Fischer… - 2025 - publications.cispa.de
Transparent reporting of research is a crucial aspect of good scientific practice and
contributes to trustworthy science. Transparency helps to understand research processes …

Machine Learning in Space: Surveying the Robustness of on-board ML models to Radiation

K Lange, F Fontana, F Rossi, M Varile… - 2024 IEEE Space …, 2024 - ieeexplore.ieee.org
Modern spacecraft are increasingly relying on machine learning (ML). However, physical
equipment in space is subject to various natural hazards, such as radiation, which may …

Every Breath You Don't Take: Deepfake Speech Detection Using Breath

S Layton, T De Andrade, D Olszewski, K Warren… - arxiv preprint arxiv …, 2024 - arxiv.org
Deepfake speech represents a real and growing threat to systems and society. Many
detectors have been created to aid in defense against speech deepfakes. While these …