Performance Evaluation of Adversarial Attacks: Discrepancies and Solutions Authors: Jing Wu, Mingyi Zhou, Ce Zhu, Yipeng Liu, Mehrtash Harandi, Li Li | Published: 2021-04-22 2021.04.22 2025.05.28 Literature Database
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22 2021.04.22 2025.05.28 Literature Database
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22 2021.04.22 2025.05.28 Literature Database
Robustness of ML-Enhanced IDS to Stealthy Adversaries Authors: Vance Wong, John Emanuello | Published: 2021-04-21 2021.04.21 2025.05.28 Literature Database
Dataset Inference: Ownership Resolution in Machine Learning Authors: Pratyush Maini, Mohammad Yaghini, Nicolas Papernot | Published: 2021-04-21 2021.04.21 2025.05.28 Literature Database
Jacobian Regularization for Mitigating Universal Adversarial Perturbations Authors: Kenneth T. Co, David Martinez Rego, Emil C. Lupu | Published: 2021-04-21 | Updated: 2021-09-13 2021.04.21 2025.05.28 Literature Database
Identifying botnet IP address clusters using natural language processing techniques on honeypot command logs Authors: Valentino Crespi, Wes Hardaker, Sami Abu-El-Haija, Aram Galstyan | Published: 2021-04-20 2021.04.20 2025.05.28 Literature Database
On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea | Published: 2021-04-20 | Updated: 2022-05-27 2021.04.20 2025.05.28 Literature Database
Voting Classifier-based Intrusion Detection for IoT Networks Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad | Published: 2021-04-20 | Updated: 2021-04-25 2021.04.20 2025.05.28 Literature Database
Adversarial Training for Deep Learning-based Intrusion Detection Systems Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees | Published: 2021-04-20 2021.04.20 2025.05.28 Literature Database