Literature Database

A Machine Learning Approach for DDoS Detection on IoT Devices

Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28
DDoS Attack
Data Preprocessing
Machine Learning Method

Robustness of Graph Neural Networks at Scale

Authors: Simon Geisler, Tobias Schmidt, Hakan Şirin, Daniel Zügner, Aleksandar Bojchevski, Stephan Günnemann | Published: 2021-10-26 | Updated: 2023-04-30
Graph Representation Learning
Robustness
Adversarial Learning

SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning

Authors: Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su | Published: 2021-10-26
Characteristics of RDP
Training Protocol
Privacy Protection Mechanism

Anomaly-Based Intrusion Detection System for Cyber-Physical System Security

Authors: Riccardo Colelli, Filippo Magri, Stefano Panzieri, Federica Pascucci | Published: 2021-10-25
ML-Based IDS
Simulation Environment
Intrusion Detection System

DP-XGBoost: Private Machine Learning at Scale

Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25
Algorithm Design
Privacy Protection
Machine Learning Algorithm

Orthogonal variance-based feature selection for intrusion detection systems

Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25
ML-Based IDS
Machine Learning Algorithm
Feature Extraction Method

Addressing Privacy Threats from Machine Learning

Authors: Mary Anne Smart | Published: 2021-10-25
Privacy Protection
Human-Centered Approach
Role of Machine Learning

Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples

Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24
Poisoning
Adversarial Example Detection
evaluation metrics

Differentially Private Coordinate Descent for Composite Empirical Risk Minimization

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2021-10-22 | Updated: 2022-10-21
Algorithm Design
Privacy Protection
Machine Learning Method

PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy

Authors: Xiaolan Gu, Ming Li, Li Xiong | Published: 2021-10-22
Privacy Protection
Poisoning
Robustness Evaluation