Clustering methods

Inductive Graph Unlearning

Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07
Graph Neural Network
Clustering methods
Experimental Validation

Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27
Client Clustering
Clustering methods
Performance Evaluation

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04
Clustering methods
Poisoning
Attack Method

Attacker Attribution of Audio Deepfakes

Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28
Clustering methods
Membership Inference
Speech Synthesis Technology

Clustering and Analysis of Vulnerabilities Present in Different Robot Types

Authors: Chinwe Ekenna, Bharvee Acharya | Published: 2020-08-18
Clustering methods
Security Analysis
Threat Model

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12
Clustering methods
Attack Pattern Extraction
evaluation metrics

Equivalence relations and $L^p$ distances between time series with application to the Black Summer Australian bushfires

Authors: Nick James, Max Menzies | Published: 2020-02-07 | Updated: 2023-02-28
Clustering methods
Data-Driven Clustering
Definition of Mathematical Concepts

Softmax-based Classification is k-means Clustering: Formal Proof, Consequences for Adversarial Attacks, and Improvement through Centroid Based Tailoring

Authors: Sibylle Hess, Wouter Duivesteijn, Decebal Mocanu | Published: 2020-01-07
Clustering methods
Robustness Evaluation
Adversarial Learning

A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory

Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08
Clustering methods
Fraudulent Transaction
Initialization Method

Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark

Authors: Dimitrios Sisiaridis, Olivier Markowitch | Published: 2017-12-11
Clustering methods
Data Preprocessing
Feature Extraction Method