Literature Database

Machine Learning in IoT Security: Current Solutions and Future Challenges

Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14
Characteristics of IoT Networks
Machine Learning Method
Deep Learning

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Authors: Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang | Published: 2019-03-13
Data Curation
Malware Detection Method
Generalized Poisson Distribution

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13
Phishing Detection
Feature Interdependence
Anomaly Detection Method

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12
Certified Robustness
Adversarial attack
Physical attack

Detection of LDDoS Attacks Based on TCP Connection Parameters

Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12
DDoS Attack
TCP Connection Characteristics
Machine Learning Algorithm

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification

Authors: Scott E. Coull, Christopher Gardner | Published: 2019-03-12 | Updated: 2019-03-20
Malware Classification Using CNN
Dataset for Malware Classification
Feature Interdependence

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12
Hardware Security
Backdoor Detection
Multi-Class Classification

Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-10
Byzantine Consensus Mechanism
Robustness Improvement Method
Optimization Problem

Semantics Preserving Adversarial Learning

Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21
Robustness Improvement Method
Adversarial Example Detection
Adversarial Perturbation Techniques

A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory

Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08
Clustering methods
Fraudulent Transaction
Initialization Method