Online Encrypted Skype Identification Based on an Updating Mechanism Authors: Shi Dong | Published: 2022-03-23 2022.03.23 2025.05.28 Literature Database
Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10 2022.03.22 2025.05.28 Literature Database
Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02 2022.03.22 2025.05.28 Literature Database
FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic Authors: Sankha Das | Published: 2022-03-21 2022.03.21 2025.05.28 Literature Database
Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21 2022.03.21 2025.05.28 Literature Database
RareGAN: Generating Samples for Rare Classes Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20 2022.03.20 2025.05.28 Literature Database
The Dark Side: Security Concerns in Machine Learning for EDA Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20 2022.03.20 2025.05.28 Literature Database
On Robust Prefix-Tuning for Text Classification Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19 2022.03.19 2025.05.28 Literature Database
Privacy-Preserving Reinforcement Learning Beyond Expectation Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18 2022.03.18 2025.05.28 Literature Database
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18 2022.03.18 2025.05.28 Literature Database