Avast-CTU Public CAPE Dataset Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol | Published: 2022-09-06 Digital ForensicsModel Design and AccuracyModel Design 2022.09.06 2025.05.28 Literature Database
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data Authors: Chathurika S. Wickramasinghe, Daniel L. Marino, Harindra S. Mavikumbure, Victor Cobilean, Timothy D. Pennington, Benny J. Varghese, Craig Rieger, Milos Manic | Published: 2022-09-05 Model DesignIntrusion Detection SystemAdversarial Attack Detection 2022.09.05 2025.05.28 Literature Database
Beyond Random Split for Assessing Statistical Model Performance Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta | Published: 2022-09-04 Sampling MethodDataset GenerationModel Design 2022.09.04 2025.05.28 Literature Database
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu | Published: 2022-09-04 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.04 2025.05.28 Literature Database
Unlocking High-Accuracy Differentially Private Image Classification through Scale Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16 Privacy Protection MethodModel DesignComputational Efficiency 2022.04.28 2025.05.28 Literature Database
Prediction Approach against DDoS Attack based on Machine Learning Multiclassfier Authors: Anupama Mishra | Published: 2022-04-27 CybersecurityModel DesignAttack Method 2022.04.27 2025.05.28 Literature Database
Towards Privacy-Preserving Neural Architecture Search Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22 Privacy Protection MethodPrivacy Enhancing TechnologyModel Design 2022.04.22 2025.05.28 Literature Database
A Theoretical View of Linear Backpropagation and Its Convergence Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10 Model DesignConvergence AnalysisDefense Method 2021.12.21 2025.05.28 Literature Database
ML Supported Predictions for SAT Solvers Performance Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17 Model DesignPerformance Evaluation MetricsMachine Learning Method 2021.12.17 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database