Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26 Model Performance EvaluationAttacker Behavior AnalysisAnomaly Detection Method 2017.09.26 2025.05.13 Literature Database
Key Management and Learning based Two Level Data Security for Metering Infrastructure of Smart Grid Authors: Imtiaz Parvez, Maryamossadat Aghili, Arif Sarwat | Published: 2017-09-25 Privacy Enhancing TechnologyInformation SecurityAnomaly Detection Method 2017.09.25 2025.05.13 Literature Database
Deep Learning for Secure Mobile Edge Computing Authors: Yuanfang Chen, Yan Zhang, Sabita Maharjan | Published: 2017-09-23 Malware DetectionDynamic Analysis FrameworkStructural Learning 2017.09.23 2025.05.13 Literature Database
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23 Model Performance EvaluationAttack DetectionUnknown Attack Detection 2017.09.23 2025.05.13 Literature Database
Characterizing Diabetes, Diet, Exercise, and Obesity Comments on Twitter Authors: Amir Karami, Alicia A. Dahl, Gabrielle Turner-McGrievy, Hadi Kharrazi, Jr., George Shaw | Published: 2017-09-22 Data CollectionData Collection MethodInterpretation of Topic Models 2017.09.22 2025.05.13 Literature Database
Machine Learning Models that Remember Too Much Authors: Congzheng Song, Thomas Ristenpart, Vitaly Shmatikov | Published: 2017-09-22 Privacy Protection MechanismPrivacy LeakageModel Extraction Attack 2017.09.22 2025.05.13 Literature Database
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20 Malware DetectionModel Performance EvaluationMachine Learning Technology 2017.09.20 2025.05.13 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.13 Literature Database
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2017-09-17 | Updated: 2019-12-31 Certified RobustnessAdversarial LearningAdversarial Example Detection 2017.09.17 2025.05.13 Literature Database
Detection of Unauthorized IoT Devices Using Machine Learning Techniques Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14 Backdoor DetectionModel Performance EvaluationAttack Detection 2017.09.14 2025.05.13 Literature Database