Model Performance Evaluation

Data Provenance via Differential Auditing

Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04
Data Origins and Evolution
Privacy Enhancing Technology
Model Performance Evaluation

Group Property Inference Attacks Against Graph Neural Networks

Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02
Membership Inference
Model Performance Evaluation
Adversarial Attack Methods

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02
Model Performance Evaluation
Adversarial Attack Methods
Communication Analysis

Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02
Model Interpretability
Model Performance Evaluation
Experimental Validation

CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach

Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01
Model Performance Evaluation
Experimental Validation
Hierarchical Classification Methods

DiVa: An Accelerator for Differentially Private Machine Learning

Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26
Model Performance Evaluation
Efficiency Evaluation
Improvement of Learning

Generative Extraction of Audio Classifiers for Speaker Identification

Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26
Dataset Generation
Model Performance Evaluation
Speech Recognition Process

$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25
Out-of-Distribution Detection
Model Performance Evaluation
Hierarchical Classification Methods

Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25
Attack Methods against DFL
Membership Inference
Model Performance Evaluation

Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence

Authors: Markus Bayer, Tobias Frey, Christian Reuter | Published: 2022-07-22
Dataset Generation
Model Performance Evaluation
Expert Opinion Collection Process