Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm Authors: Fan Huang | Published: 2021-05-28 2021.05.28 2025.05.28 Literature Database
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27 2021.05.27 2025.05.28 Literature Database
Intrusion Detection using Machine Learning Techniques: An Experimental Comparison Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27 2021.05.27 2025.05.28 Literature Database
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 2021.05.27 2025.05.28 Literature Database
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 2021.05.26 2025.05.28 Literature Database
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26 2021.05.26 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 2021.05.25 2025.05.28 Literature Database
Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24 2021.05.24 2025.05.28 Literature Database
Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 2021.05.23 2025.05.28 Literature Database
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 2021.05.23 2025.05.28 Literature Database