Literature Database

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11
DDoS Attack
Data Collection
Machine Learning Method

STC Antispoofing Systems for the ASVspoof2019 Challenge

Authors: Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, Alexandr Kozlov | Published: 2019-04-11
Deep Learning Technology
Feature Extraction Method
Speech Synthesis Technology

Universal Lipschitz Approximation in Bounded Depth Neural Networks

Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09
Robustness Analysis
Polynomial Approximation
Machine Learning Algorithm

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01
Privacy Enhancing Technology
Encryption Technology
Hierarchical Clustering

A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29
Model evaluation methods
Adversarial Attack Methods
Deep Learning Technology

Malware Evasion Attack and Defense

Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16
Malware Detection
Adversarial Example
Adversarial Attack Detection

Reframing Threat Detection: Inside esINSIDER

Authors: M. Arthur Munson, Jason Kichen, Dustin Hillard, Ashley Fidler, Peiter Zatko | Published: 2019-04-07
Data Origins and Evolution
Internal Network Reconnaissance
Anomaly Detection Method

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment

Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05
Data Origins and Evolution
Data Dependency
Machine Learning Application

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method