A Machine Learning Approach for DDoS Detection on IoT Devices Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28 DDoS AttackData PreprocessingMachine Learning Method 2021.10.28 2025.05.28 Literature Database
Robustness of Graph Neural Networks at Scale Authors: Simon Geisler, Tobias Schmidt, Hakan Şirin, Daniel Zügner, Aleksandar Bojchevski, Stephan Günnemann | Published: 2021-10-26 | Updated: 2023-04-30 Graph Representation LearningRobustnessAdversarial Learning 2021.10.26 2025.05.28 Literature Database
SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning Authors: Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su | Published: 2021-10-26 Characteristics of RDPTraining ProtocolPrivacy Protection Mechanism 2021.10.26 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection System for Cyber-Physical System Security Authors: Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci | Published: 2021-10-25 ML-Based IDSSimulation EnvironmentIntrusion Detection System 2021.10.25 2025.05.28 Literature Database
DP-XGBoost: Private Machine Learning at Scale Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25 Algorithm DesignPrivacy ProtectionMachine Learning Algorithm 2021.10.25 2025.05.28 Literature Database
Orthogonal variance-based feature selection for intrusion detection systems Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25 ML-Based IDSMachine Learning AlgorithmFeature Extraction Method 2021.10.25 2025.05.28 Literature Database
Addressing Privacy Threats from Machine Learning Authors: Mary Anne Smart | Published: 2021-10-25 Privacy ProtectionHuman-Centered ApproachRole of Machine Learning 2021.10.25 2025.05.28 Literature Database
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24 PoisoningAdversarial Example Detectionevaluation metrics 2021.10.24 2025.05.28 Literature Database
Differentially Private Coordinate Descent for Composite Empirical Risk Minimization Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2021-10-22 | Updated: 2022-10-21 Algorithm DesignPrivacy ProtectionMachine Learning Method 2021.10.22 2025.05.28 Literature Database
PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy Authors: Xiaolan Gu, Ming Li, Li Xiong | Published: 2021-10-22 Privacy ProtectionPoisoningRobustness Evaluation 2021.10.22 2025.05.28 Literature Database