Literature Database

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05
Poisoning
Label Uncertainty
Adversarial Training

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08
Data Contamination Detection
Convergence Guarantee
Optimization Methods

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28
Data Preprocessing
Data Collection
User Behavior Analysis

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27
Data-Driven Clustering
Malware Propagation Means
Natural Language Processing

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27
ML-Based IDS
Cyber Attack
Classification Pattern Analysis

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27
Privacy Protection Method
Information-Theoretic Evaluation
Vulnerability Assessment Method

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10
Data Contamination Detection
Poisoning
Vulnerability Assessment Method

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26
ML-Based IDS
Cyber Attack
Data Preprocessing

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25
Cyber Attack
Cyber Threat
Data Collection

Every Byte Matters: Traffic Analysis of Bluetooth Wearable Devices

Authors: Ludovic Barman, Alexandre Dumur, Apostolos Pyrgelis, Jean-Pierre Hubaux | Published: 2021-05-24
Data Collection
User Behavior Analysis
Classification Pattern Analysis