Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13 Data CollectionModel Performance EvaluationFeature Importance Analysis 2018.11.13 2025.05.28 Literature Database
MixTrain: Scalable Training of Verifiably Robust Neural Networks Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.06 2025.05.28 Literature Database
Exploring Connections Between Active Learning and Model Extraction Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20 Online LearningModel Performance EvaluationModel Extraction Attack 2018.11.05 2025.05.28 Literature Database
Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05 Privacy-Preserving Machine LearningModel Performance EvaluationBiometric Key Generation 2017.11.05 2025.05.28 Literature Database
Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26 Model Performance EvaluationAttacker Behavior AnalysisAnomaly Detection Method 2017.09.26 2025.05.28 Literature Database
A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23 Model Performance EvaluationAttack DetectionUnknown Attack Detection 2017.09.23 2025.05.28 Literature Database
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20 Malware DetectionModel Performance EvaluationMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Detection of Unauthorized IoT Devices Using Machine Learning Techniques Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14 Backdoor DetectionModel Performance EvaluationAttack Detection 2017.09.14 2025.05.28 Literature Database
Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks Authors: Thilo Strauss, Markus Hanselmann, Andrej Junginger, Holger Ulmer | Published: 2017-09-11 | Updated: 2018-02-08 Certified RobustnessModel Performance EvaluationRobustness Improvement 2017.09.11 2025.05.28 Literature Database
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07 Model Performance EvaluationAttack DetectionMachine Learning Technology 2017.09.10 2025.05.28 Literature Database