A Machine Learning Based Intrusion Detection System for Software Defined 5G Network Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10 Model Performance EvaluationRandom ForestMachine Learning Method 2017.07.10 2025.05.28 Literature Database
6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30 Data CollectionUser Behavior AnalysisAnomaly Detection Algorithm 2017.06.30 2025.05.28 Literature Database
Towards Deep Learning Models Resistant to Adversarial Attacks Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04 Certified RobustnessRobustness EvaluationAdversarial Example 2017.06.19 2025.05.28 Literature Database
Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31 Malware ClassificationDetection of Poisonous DataFeature Selection Method 2017.06.13 2025.05.28 Literature Database
Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway Authors: Veronica del Carmen Estrada | Published: 2017-06-10 TCP Session ManagementData CollectionAnomaly Detection Algorithm 2017.06.10 2025.05.28 Literature Database
Certified Defenses for Data Poisoning Attacks Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24 PoisoningOptimization ProblemDetection of Poisonous Data 2017.06.09 2025.05.28 Literature Database
A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2017-06-08 | Updated: 2017-10-16 Privacy Protection MechanismPrivacy IssuesDifferential Privacy 2017.06.08 2025.05.28 Literature Database
Localization of JPEG double compression through multi-domain convolutional neural networks Authors: Irene Amerini, Tiberio Uricchio, Lamberto Ballan, Roberto Caldelli | Published: 2017-06-06 Data Flow AnalysisModel ArchitectureImage Forensics 2017.06.06 2025.05.28 Literature Database
Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation Authors: Andrew Norton, Yanjun Qi | Published: 2017-06-06 | Updated: 2017-06-16 Certified RobustnessAttack TypeAdversarial Learning 2017.06.06 2025.05.28 Literature Database
Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version) Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-06-03 | Updated: 2017-07-06 Online LearningPrivacy IssuesFeature Selection 2017.06.03 2025.05.28 Literature Database