Picture for Jan von der Assen

Jan von der Assen

DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences

Add code
Feb 07, 2025
Figure 1 for DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
Figure 2 for DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
Figure 3 for DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
Figure 4 for DMPA: Model Poisoning Attacks on Decentralized Federated Learning for Model Differences
Viaarxiv icon

FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning

Add code
Oct 10, 2024
Figure 1 for FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning
Figure 2 for FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning
Figure 3 for FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning
Figure 4 for FedEP: Tailoring Attention to Heterogeneous Data Distribution with Entropy Pooling for Decentralized Federated Learning
Viaarxiv icon

CyberForce: A Federated Reinforcement Learning Framework for Malware Mitigation

Add code
Aug 11, 2023
Viaarxiv icon

RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports

Add code
Jul 20, 2023
Figure 1 for RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports
Figure 2 for RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports
Figure 3 for RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports
Figure 4 for RCVaR: an Economic Approach to Estimate Cyberattacks Costs using Data from Industry Reports
Viaarxiv icon

RansomAI: AI-powered Ransomware for Stealthy Encryption

Add code
Jun 27, 2023
Viaarxiv icon

RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT

Add code
Dec 30, 2022
Figure 1 for RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
Figure 2 for RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
Figure 3 for RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
Figure 4 for RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT
Viaarxiv icon

A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices

Add code
Oct 14, 2022
Figure 1 for A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Figure 2 for A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Figure 3 for A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Figure 4 for A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices
Viaarxiv icon