Literature Database

Secure and Robust Machine Learning for Healthcare: A Survey

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21
Medical Image Analysis
Adversarial Example
Machine Learning Method

An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14
DDoS Attack Detection
Network Threat Detection
Machine Learning Method

Intelligent Methods for Accurately Detecting Phishing Websites

Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19
Information Security
Machine Learning Algorithm
Feature Extraction Method

Pelican: A Deep Residual Network for Network Intrusion Detection

Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08
Network Threat Detection
Machine Learning Method
Deep Reinforcement Learning

Ownership preserving AI Market Places using Blockchain

Authors: Nishant Baranwal Somy, Kalapriya Kannan, Vijay Arya, Sandeep Hans, Abhishek Singh, Pranay Lohia, Sameep Mehta | Published: 2020-01-18
Cloud Computing
Privacy Enhancing Technology
Model Communication

Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset

Authors: Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi | Published: 2020-01-18
DDoS Attack Detection
Security Analysis
Machine Learning Technology

IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing

Authors: Maurizio Aiello, Enrico Cambiaso, Roberto Canonico, Leonardo Maccari, Marco Mellia, Antonio Pescapè, Ivan Vaccari | Published: 2020-01-17
Privacy Enhancing Technology
Usability
Machine Learning Method

Cyber Attack Detection thanks to Machine Learning Algorithms

Authors: Antoine Delplace, Sheryl Hermoso, Kristofer Anandita | Published: 2020-01-17
Machine Learning Method
Feature Engineering
Statistical Methods

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16
Adversarial Example
Adversarial Learning
Computational Complexity

A simple way to make neural networks robust against diverse image corruptions

Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22
Robustness Analysis
Convergence analysis
Adversarial Learning