Model Performance Evaluation

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Trigger Detection
Model Performance Evaluation
Encryption Technology

Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining

Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18
FR Detection Mechanism
Data Collection
Model Performance Evaluation

Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives

Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13
Data Collection
Model Performance Evaluation
Feature Importance Analysis

MixTrain: Scalable Training of Verifiably Robust Neural Networks

Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01
Model Performance Evaluation
Robustness Improvement
Adversarial Learning

Exploring Connections Between Active Learning and Model Extraction

Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20
Online Learning
Model Performance Evaluation
Model Extraction Attack

Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification

Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05
Privacy-Preserving Machine Learning
Model Performance Evaluation
Biometric Key Generation

Catching Anomalous Distributed Photovoltaics: An Edge-based Multi-modal Anomaly Detection

Authors: Devu Manikantan Shilay, Kin Gwn Lorey, Tianshu Weiz, Teems Lovetty, Yu Cheng | Published: 2017-09-26
Model Performance Evaluation
Attacker Behavior Analysis
Anomaly Detection Method

A Grassmannian Approach to Zero-Shot Learning for Network Intrusion Detection

Authors: Jorge Rivero, Bernardete Ribeiro, Ning Chen, Fátima Silva Leite | Published: 2017-09-23
Model Performance Evaluation
Attack Detection
Unknown Attack Detection

Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20
Malware Detection
Model Performance Evaluation
Machine Learning Technology

Detection of Unauthorized IoT Devices Using Machine Learning Techniques

Authors: Yair Meidan, Michael Bohadana, Asaf Shabtai, Martin Ochoa, Nils Ole Tippenhauer, Juan Davis Guarnizo, Yuval Elovici | Published: 2017-09-14
Backdoor Detection
Model Performance Evaluation
Attack Detection