Automatic Detection of Malware-Generated Domains with Recurrent Neural Models Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20 Malware DetectionModel Performance EvaluationMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification Authors: Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2017-09-17 | Updated: 2019-12-31 Certified RobustnessAdversarial LearningAdversarial Example Detection 2017.09.17 2025.05.28 Literature Database
Detection of Unauthorized IoT Devices Using Machine Learning Techniques Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14 Backdoor DetectionModel Performance EvaluationAttack Detection 2017.09.14 2025.05.28 Literature Database
Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.28 Literature Database
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples Authors: Pin-Yu Chen, Yash Sharma, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-09-13 | Updated: 2018-02-10 Certified RobustnessAdversarial LearningAdversarial Example 2017.09.13 2025.05.28 Literature Database
Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks Authors: Thilo Strauss, Markus Hanselmann, Andrej Junginger, Holger Ulmer | Published: 2017-09-11 | Updated: 2018-02-08 Certified RobustnessModel Performance EvaluationRobustness Improvement 2017.09.11 2025.05.28 Literature Database
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07 Model Performance EvaluationAttack DetectionMachine Learning Technology 2017.09.10 2025.05.28 Literature Database
Towards Proving the Adversarial Robustness of Deep Neural Networks Authors: Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, Mykel J. Kochenderfer | Published: 2017-09-08 Certified RobustnessRobustness ImprovementAdversarial Learning 2017.09.08 2025.05.28 Literature Database
Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting Authors: Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha | Published: 2017-09-05 | Updated: 2018-05-04 Privacy AnalysisPrivacy LeakageMembership Inference 2017.09.05 2025.05.28 Literature Database