FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic Authors: Sankha Das | Published: 2022-03-21 Model CommunicationIntrusion Detection SystemGenerative Adversarial Network 2022.03.21 2025.05.28 Literature Database
Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21 Training Data GenerationAnalysis of Detection MethodsMachine Learning 2022.03.21 2025.05.28 Literature Database
RareGAN: Generating Samples for Rare Classes Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20 Active LearningTrade-off AnalysisTraining Data Generation 2022.03.20 2025.05.28 Literature Database
The Dark Side: Security Concerns in Machine Learning for EDA Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20 Training Data GenerationPrivacy Risk ManagementMalicious Client 2022.03.20 2025.05.28 Literature Database
On Robust Prefix-Tuning for Text Classification Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19 XAI (Explainable AI)Trade-off AnalysisParameter Tuning 2022.03.19 2025.05.28 Literature Database
Privacy-Preserving Reinforcement Learning Beyond Expectation Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18 Privacy AssessmentRisk Assessment MethodReinforcement Learning Algorithm 2022.03.18 2025.05.28 Literature Database
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18 DDoS AttackEnergy-Based ModelAttack Method 2022.03.18 2025.05.28 Literature Database
AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks Authors: Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili | Published: 2022-03-18 DDoS AttackIoT CybersecurityIntrusion Detection System 2022.03.18 2025.05.28 Literature Database
Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network Authors: Hai N. Nguyen, Guevara Noubir | Published: 2022-03-18 Performance EvaluationWireless Channel DetectionCommunication Model 2022.03.18 2025.05.28 Literature Database
Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17 Data Management SystemPerformance EvaluationMachine Learning Algorithm 2022.03.17 2025.05.28 Literature Database