Literature Database

A Bayesian Hierarchical Model for Criminal Investigations

Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05
Task Design
Data Extraction and Analysis
Information Gathering Methods

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05
Automation of Cybersecurity
Data Extraction and Analysis
Information Gathering Methods

MimosaNet: An Unrobust Neural Network Preventing Model Stealing

Authors: Kálmán Szentannai, Jalal Al-Afandi, András Horváth | Published: 2019-07-02
DNN IP Protection Method
Adversarial attack
Deep Learning Method

Protecting Privacy of Users in Brain-Computer Interface Applications

Authors: Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento | Published: 2019-07-02
Secure Logistic Regression
Privacy Protection
Machine Learning Framework

Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts

Authors: Xiaoyu Du, Mark Scanlon | Published: 2019-07-02
Data Extraction and Analysis
Machine Learning Framework
Research Methodology

Treant: Training Evasion-Aware Decision Trees

Authors: Stefano Calzavara, Claudio Lucchese, Gabriele Tolomei, Seyum Assefa Abebe, Salvatore Orlando | Published: 2019-07-02 | Updated: 2019-07-03
Adversarial attack
Optimization Strategy
Machine Learning Framework

Accurate, reliable and fast robustness evaluation

Authors: Wieland Brendel, Jonas Rauber, Matthias Kümmerer, Ivan Ustyuzhaninov, Matthias Bethge | Published: 2019-07-01 | Updated: 2019-12-12
Adversarial attack
Optimization Strategy
Deep Learning Method

Comment on “Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network”

Authors: Roland S. Zimmermann | Published: 2019-07-01
Poisoning
Adversarial attack
Deep Learning Method

System Misuse Detection via Informed Behavior Clustering and Modeling

Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01
Data Extraction and Analysis
Machine Learning Framework
Anomaly Detection Method

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28
Security Testing
Machine Learning Framework
Research Methodology