Clustering methods

Online Clustering of Known and Emerging Malware Families

Authors: Olha Jurečková, Martin Jureček, Mark Stamp | Published: 2024-05-06
Online Learning
Clustering methods
Malware Classification

LMEraser: Large Model Unlearning through Adaptive Prompt Tuning

Authors: Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia | Published: 2024-04-17
Clustering methods
Privacy Protection Method
Model Performance Evaluation

Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability

Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23
Clustering methods
Adversarial Example
Adversarial Training

FedSiKD: Clients Similarity and Knowledge Distillation: Addressing Non-i.i.d. and Constraints in Federated Learning

Authors: Yousef Alsenani, Rahul Mishra, Khaled R. Ahmed, Atta Ur Rahman | Published: 2024-02-14
Client Clustering
Clustering methods
Federated Learning

Federated unsupervised random forest for privacy-preserving patient stratification

Authors: Bastian Pfeifer, Christel Sirocchi, Marcus D. Bloice, Markus Kreuzthaler, Martin Urschler | Published: 2024-01-29
Clustering methods
Random Forest
Federated Learning

A provable initialization and robust clustering method for general mixture models

Authors: Soham Jana, Jianqing Fan, Sanjeev Kulkarni | Published: 2024-01-10 | Updated: 2024-10-23
Clustering methods
Robustness Evaluation
Adversarial attack

Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey

Authors: Rabia Nasir, Humaira Ashraf, NZ Jhanjhi | Published: 2023-12-20
Clustering methods
Protocol Performance Evaluation
Trust Evaluation

RAGLog: Log Anomaly Detection using Retrieval Augmented Generation

Authors: Jonathan Pan, Swee Liang Wong, Yidi Yuan | Published: 2023-11-09
Clustering methods
Class Imbalance
Challenges of Log Analysis

Risk factor aggregation and stress testing

Authors: Natalie Packham | Published: 2023-10-06
Clustering methods
Data Collection
Machine Learning Method

Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings

Authors: Mark-Oliver Stehr, Minyoung Kim | Published: 2023-08-23
Clustering methods
Membership Inference
Machine Learning Method