Literature Database

WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices

Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22
Data Collection Method
Feature Selection
Authentication Technology

Elliptical modeling and pattern analysis for perturbation models and classfication

Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22
Data Privacy Assessment
Privacy-Preserving Machine Learning
Model evaluation methods

A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity

Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03
Model evaluation methods
Convergence Property
Definition of Mathematical Concepts

Solving the “false positives” problem in fraud prediction

Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20
Data Extraction and Analysis
Model evaluation methods
evaluation metrics

Learning Differentially Private Recurrent Language Models

Authors: H. Brendan McMahan, Daniel Ramage, Kunal Talwar, Li Zhang | Published: 2017-10-18 | Updated: 2018-02-24
Privacy-Preserving Machine Learning
Differential Privacy
Deep Learning

Boosting Adversarial Attacks with Momentum

Authors: Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, Jianguo Li | Published: 2017-10-17 | Updated: 2018-03-22
Certified Robustness
Robustness Improvement Method
Adversarial Example Detection

Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15
Data Collection Method
Malware Detection Method
Information Security

Robust Decentralized Learning Using ADMM with Unreliable Agents

Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21
Robustness Improvement Method
Convergence Property
Watermark

Differentially Private Query Learning: from Data Publishing to Model Publishing

Authors: Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu | Published: 2017-10-13
Data Privacy Assessment
Privacy-Preserving Machine Learning
Differential Privacy

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System

Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07
Malware Detection Method
Information Security
Anomaly Detection Method