Evaluation of Machine Learning Algorithms for Intrusion Detection System Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08 ML-Based IDSData PreprocessingMachine Learning Method 2018.01.08 2025.05.13 Literature Database
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08 Multi-Domain Data AnalysisDynamic Analysis MethodMachine Learning Method 2018.01.08 2025.05.13 Literature Database
Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 Certified RobustnessAdversarial Attack MethodsMachine Learning Algorithm 2018.01.06 2025.05.13 Literature Database
A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05 User Authentication SystemMachine Learning MethodFacial Recognition Technology 2018.01.05 2025.05.13 Literature Database
Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice? Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05 Experimental ValidationMathematical AnalysisMachine Learning Algorithm 2018.01.05 2025.05.13 Literature Database
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13 Code GenerationExperimental ValidationMachine Learning Algorithm 2018.01.03 2025.05.13 Literature Database
Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 Adversarial Attack MethodsMachine Learning AlgorithmSpeech Enhancement Technology 2018.01.02 2025.05.13 Literature Database
A Deep Belief Network Based Machine Learning System for Risky Host Detection Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29 Risk ManagementPerformance Evaluation MetricsMachine Learning Algorithm 2017.12.29 2025.05.13 Literature Database
Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16 Model DesignMachine Learning AlgorithmMachine Learning Framework 2017.12.29 2025.05.13 Literature Database
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods Authors: Mouhammd Alkasassbeh | Published: 2017-12-27 Machine Learning AlgorithmFeature Selection MethodCommunication System 2017.12.27 2025.05.13 Literature Database