Dataset Analysis

Feature importance in mobile malware detection

Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28
Dataset Analysis
Malware Detection Method
Feature Importance Analysis

Embedding Java Classes with code2vec: Improvements from Variable Obfuscation

Authors: Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay | Published: 2020-04-06
Code Embedding Method
Code Obfuscation
Dataset Analysis

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

Authors: Sean M. Devine, Nathaniel D. Bastian | Published: 2019-07-06
Dataset Analysis
Model Selection
Machine Learning Framework

Towards Stable and Efficient Training of Verifiably Robust Neural Networks

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27
Dataset Analysis
Stability Assessment
Adversarial Perturbation Techniques

Evaluating Explanation Methods for Deep Learning in Security

Authors: Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck | Published: 2019-06-05 | Updated: 2020-04-27
Dataset Analysis
Deep Learning Technology
Explainability Evaluation

Disparate Vulnerability to Membership Inference Attacks

Authors: Bogdan Kulynych, Mohammad Yaghini, Giovanni Cherubin, Michael Veale, Carmela Troncoso | Published: 2019-06-02 | Updated: 2021-09-16
Dataset Analysis
Privacy Assessment
Membership Inference

SHE: A Fast and Accurate Deep Neural Network for Encrypted Data

Authors: Qian Lou, Lei Jiang | Published: 2019-06-01 | Updated: 2019-11-16
Dataset Analysis
Deep Learning Technology
Computational Efficiency

Automatically Dismantling Online Dating Fraud

Authors: Guillermo Suarez-Tangil, Matthew Edwards, Claudia Peersman, Gianluca Stringhini, Awais Rashid, Monica Whitty | Published: 2019-05-29 | Updated: 2019-05-30
Dataset Analysis
Data Collection Method
Profile Characteristic Analysis

Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models

Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06
Dataset Analysis
Model Evaluation
Attack Detection

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28
Dataset Analysis
Model Evaluation
Anomaly Detection Algorithm