Pareto Regret Analyses in Multi-objective Multi-armed Bandit Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30 Algorithm DesignOnline LearningOptimization Problem 2022.12.01 2025.05.28 Literature Database
Do you pay for Privacy in Online learning? Authors: Amartya Sanyal, Giorgia Ramponi | Published: 2022-10-10 Online LearningPrivacy Enhancing Technology 2022.10.10 2025.05.28 Literature Database
An Online Ensemble Learning Model for Detecting Attacks in Wireless Sensor Networks Authors: Hiba Tabbaa, Samir Ifzarne, Imad Hafidi | Published: 2022-04-28 Online LearningNetwork Node ConfigurationIntrusion Detection System 2022.04.28 2025.05.28 Literature Database
Accumulative Poisoning Attacks on Real-time Data Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2021-06-18 | Updated: 2021-10-26 Online LearningBackdoor AttackFederated Learning 2021.06.18 2025.05.28 Literature Database
Filtering DDoS Attacks from Unlabeled Network Traffic Data Using Online Deep Learning Authors: Wesley Joon-Wie Tann, Jackie Tan Jin Wei, Joanna Purba, Ee-Chien Chang | Published: 2020-12-12 DDoS AttackOnline LearningAttack Detection 2020.12.12 2025.05.28 Literature Database
Automatic Model Monitoring for Data Streams Authors: Fábio Pinto, Marco O. P. Sampaio, Pedro Bizarro | Published: 2019-08-12 Online LearningTime Window AnalysisAutomated Model Monitoring 2019.08.12 2025.05.28 Literature Database
Exploring Connections Between Active Learning and Model Extraction Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20 Online LearningModel Performance EvaluationModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05 Online LearningMembership InferenceAdversarial Example 2018.11.05 2025.05.28 Literature Database
Learning to Defend by Learning to Attack Authors: Haoming Jiang, Zhehui Chen, Yuyang Shi, Bo Dai, Tuo Zhao | Published: 2018-11-03 | Updated: 2021-05-02 Online LearningRobust OptimizationAdversarial Learning 2018.11.03 2025.05.28 Literature Database
Adaptive Fraud Detection System Using Dynamic Risk Features Authors: Huiying Mao, Yung-wen Liu, Yuting Jia, Jay Nanduri | Published: 2018-10-10 FR Detection MechanismOnline LearningImpact of Generalization 2018.10.10 2025.05.28 Literature Database