Dataset evaluation

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

Towards a Fair Comparison and Realistic Evaluation Framework of Android Malware Detectors based on Static Analysis and Machine Learning

Authors: Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, Jose Miguel-Alonso | Published: 2022-05-25 | Updated: 2022-10-06
Dataset evaluation
Malware Detection Method
Static Analysis

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18
Dataset evaluation
Membership Inference
Performance Evaluation

Exploiting Multiple EEG Data Domains with Adversarial Learning

Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16
Dataset evaluation
Machine Learning Method
Generative Adversarial Network

Finding MNEMON: Reviving Memories of Node Embeddings

Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29
Algorithm Design
Dataset evaluation
evaluation metrics

Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04
Dataset evaluation
Model Extraction Attack

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23
Dataset evaluation
Training Data Generation
Feature Extraction Method

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02
Dataset evaluation
Training Data Generation
Hyperparameter Optimization

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16
Dataset evaluation
Vulnerability Attack Method
Evaluation Method

Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling

Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15
Dataset evaluation
Privacy Enhancing Technology
Semi-Supervised Learning