WristAuthen: A Dynamic Time Wrapping Approach for User Authentication by Hand-Interaction through Wrist-Worn Devices Authors: Qi Lyu, Zhifeng Kong, Chao Shen, Tianwei Yue | Published: 2017-10-22 Data Collection MethodFeature SelectionAuthentication Technology 2017.10.22 2025.05.28 Literature Database
Elliptical modeling and pattern analysis for perturbation models and classfication Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22 Data Privacy AssessmentPrivacy-Preserving Machine LearningModel evaluation methods 2017.10.22 2025.05.28 Literature Database
A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03 Model evaluation methodsConvergence PropertyDefinition of Mathematical Concepts 2017.10.21 2025.05.28 Literature Database
Solving the “false positives” problem in fraud prediction Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20 Data Extraction and AnalysisModel evaluation methodsevaluation metrics 2017.10.20 2025.05.28 Literature Database
Learning Differentially Private Recurrent Language Models Authors: H. Brendan McMahan, Daniel Ramage, Kunal Talwar, Li Zhang | Published: 2017-10-18 | Updated: 2018-02-24 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2017.10.18 2025.05.28 Literature Database
Boosting Adversarial Attacks with Momentum Authors: Yinpeng Dong, Fangzhou Liao, Tianyu Pang, Hang Su, Jun Zhu, Xiaolin Hu, Jianguo Li | Published: 2017-10-17 | Updated: 2018-03-22 Certified RobustnessRobustness Improvement MethodAdversarial Example Detection 2017.10.17 2025.05.28 Literature Database
Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15 Data Collection MethodMalware Detection MethodInformation Security 2017.10.15 2025.05.28 Literature Database
Robust Decentralized Learning Using ADMM with Unreliable Agents Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21 Robustness Improvement MethodConvergence PropertyWatermark 2017.10.14 2025.05.28 Literature Database
Differentially Private Query Learning: from Data Publishing to Model Publishing Authors: Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu | Published: 2017-10-13 Data Privacy AssessmentPrivacy-Preserving Machine LearningDifferential Privacy 2017.10.13 2025.05.28 Literature Database
Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07 Malware Detection MethodInformation SecurityAnomaly Detection Method 2017.10.13 2025.05.28 Literature Database