Literature Database

An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01
User Authentication System
Performance Evaluation Metrics
Privacy Protection in Machine Learning

Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin

Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26
Trade-off Analysis
Training Method
Adversarial Example

On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04
Poisoning
Effective Perturbation Methods
Adversarial Transferability

Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning

Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25
Training Method
Adversarial Example
Adversarial Transferability

Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24
ML-Based IDS
Data Dependency
Feature Interdependence

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24
Cyber Threat
User Behavior Analysis
Malicious Prompt

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10
Security Assurance
Privacy Protection
Performance Evaluation

Enhancing Adversarial Example Transferability with an Intermediate Level Attack

Authors: Qian Huang, Isay Katsman, Horace He, Zeqi Gu, Serge Belongie, Ser-Nam Lim | Published: 2019-07-23 | Updated: 2020-02-27
Effective Perturbation Methods
Adversarial Example
Adversarial Transferability

CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection

Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23
ML-Based IDS
Cyber Threat
Data Contamination Detection

A Survey on Federated Learning Systems: Vision, Hype and Reality for Data Privacy and Protection

Authors: Qinbin Li, Zeyi Wen, Zhaomin Wu, Sixu Hu, Naibo Wang, Yuan Li, Xu Liu, Bingsheng He | Published: 2019-07-23 | Updated: 2021-12-05
Incentive Design
Privacy Protection
Framework