ShadowNet: A Secure and Efficient On-device Model Inference System for Convolutional Neural Networks Authors: Zhichuang Sun, Ruimin Sun, Changming Liu, Amrita Roy Chowdhury, Long Lu, Somesh Jha | Published: 2020-11-11 | Updated: 2023-07-06 TEE ImplementationWatermarkingModel Performance Evaluation 2020.11.11 2025.05.28 Literature Database
Efficient and Transferable Adversarial Examples from Bayesian Neural Networks Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18 Model Performance EvaluationAdversarial ExampleAdversarial attack 2020.11.10 2025.05.28 Literature Database
On the Privacy Risks of Algorithmic Fairness Authors: Hongyan Chang, Reza Shokri | Published: 2020-11-07 | Updated: 2021-04-07 Data Privacy AssessmentMembership InferenceModel Performance Evaluation 2020.11.07 2025.05.28 Literature Database
Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift Authors: Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2020-10-08 | Updated: 2024-01-08 Multi-Class ClassificationModel Performance EvaluationConcept Drift 2020.10.08 2025.05.28 Literature Database
Android Botnet Detection using Convolutional Neural Networks Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27 Botnet DetectionModel Performance EvaluationMachine Learning Application 2019.11.27 2025.05.28 Literature Database
Local Model Poisoning Attacks to Byzantine-Robust Federated Learning Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21 PoisoningModel Performance EvaluationAttack Type 2019.11.26 2025.05.28 Literature Database
Defending Against Adversarial Machine Learning Authors: Alison Jenkins | Published: 2019-11-26 Model Performance EvaluationFeature Selection MethodStatistical Analysis 2019.11.26 2025.05.28 Literature Database
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25 Model Performance EvaluationDeep Learning-Based IDSResearch Methodology 2019.11.25 2025.05.28 Literature Database
Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25 Blockchain EconomicsModel Performance EvaluationMachine Learning Application 2019.11.25 2025.05.28 Literature Database
DL-Droid: Deep learning based android malware detection using real devices Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2019-11-22 Model Performance EvaluationDeep LearningFeature Extraction Method 2019.11.22 2025.05.28 Literature Database