Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 2021.03.31 2025.05.28 Literature Database
Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31 2021.03.31 2025.05.28 Literature Database
Statistical inference for individual fairness Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 2021.03.30 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 2021.03.30 2025.05.28 Literature Database
MISA: Online Defense of Trojaned Models using Misattributions Authors: Panagiota Kiourti, Wenchao Li, Anirban Roy, Karan Sikka, Susmit Jha | Published: 2021-03-29 | Updated: 2021-09-23 2021.03.29 2025.05.28 Literature Database
Automating Defense Against Adversarial Attacks: Discovery of Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed Models Authors: Josh Kalin, David Noever, Matthew Ciolino, Dominick Hambrick, Gerry Dozier | Published: 2021-03-29 2021.03.29 2025.05.28 Literature Database
Privacy and Trust Redefined in Federated Machine Learning Authors: Pavlos Papadopoulos, Will Abramson, Adam J. Hall, Nikolaos Pitropakis, William J. Buchanan | Published: 2021-03-29 | Updated: 2021-03-30 2021.03.29 2025.05.28 Literature Database
CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks Authors: Iqbal H. Sarker | Published: 2021-03-28 2021.03.28 2025.05.28 Literature Database