Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05 PoisoningLabel UncertaintyAdversarial Training 2021.05.28 2025.05.28 Literature Database
DeepMoM: Robust Deep Learning With Median-of-Means Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08 Data Contamination DetectionConvergence GuaranteeOptimization Methods 2021.05.28 2025.05.28 Literature Database
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm Authors: Fan Huang | Published: 2021-05-28 Data PreprocessingData CollectionUser Behavior Analysis 2021.05.28 2025.05.28 Literature Database
Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27 Data-Driven ClusteringMalware Propagation MeansNatural Language Processing 2021.05.27 2025.05.28 Literature Database
Intrusion Detection using Machine Learning Techniques: An Experimental Comparison Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27 ML-Based IDSCyber AttackClassification Pattern Analysis 2021.05.27 2025.05.28 Literature Database
On Privacy and Confidentiality of Communications in Organizational Graphs Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27 Privacy Protection MethodInformation-Theoretic EvaluationVulnerability Assessment Method 2021.05.27 2025.05.28 Literature Database
Fooling Partial Dependence via Data Poisoning Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10 Data Contamination DetectionPoisoningVulnerability Assessment Method 2021.05.26 2025.05.28 Literature Database
MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26 ML-Based IDSCyber AttackData Preprocessing 2021.05.26 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 Cyber AttackCyber ThreatData Collection 2021.05.25 2025.05.28 Literature Database
Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24 Data CollectionUser Behavior AnalysisClassification Pattern Analysis 2021.05.24 2025.05.28 Literature Database