Applying Machine Learning on RSRP-based Features for False Base Station Detection Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah | Published: 2022-07-22 Model Performance EvaluationAnalysis of Detection MethodsCommunication Analysis 2022.07.22 2025.05.28 Literature Database
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13 Model Performance EvaluationIntrusion Detection SystemTransparency and Verification 2022.07.13 2025.05.28 Literature Database
A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
Game of Trojans: A Submodular Byzantine Approach Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13 Algorithm DesignModel Performance EvaluationStrategic Game 2022.07.13 2025.05.28 Literature Database
RelaxLoss: Defending Membership Inference Attacks without Losing Utility Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12 Membership InferenceModel Performance EvaluationLoss Term 2022.07.12 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning) Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02 Hyperparameter OptimizationPoisoningModel Performance Evaluation 2022.05.02 2025.05.28 Literature Database
Mobile authentication of copy detection patterns Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18 Dataset GenerationData GenerationModel Performance Evaluation 2022.03.04 2025.05.28 Literature Database
Principles for Evaluation of AI/ML Model Performance and Robustness Authors: Olivia Brown, Andrew Curtis, Justin Goodwin | Published: 2021-07-06 Model Performance EvaluationRobustnessRobustness Evaluation 2021.07.06 2025.05.28 Literature Database
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation Authors: Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael N. Johnstone, Wencheng Yang | Published: 2021-07-06 Privacy AnalysisModel Performance EvaluationMachine Learning Technology 2021.07.06 2025.05.28 Literature Database