Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04 Model evaluation methodsMachine LearningFeature Importance Analysis 2019.09.04 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21 Terror Attack Data ClassificationModel evaluation methodsDeep Learning Method 2019.01.19 2025.05.28 Literature Database
Data mining for detecting Bitcoin Ponzi schemes Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01 Data CollectionModel evaluation methodsImbalanced Dataset 2018.03.01 2025.05.28 Literature Database
Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 Data CollectionModel evaluation methodsMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Dynamic Analysis of Executables to Detect and Characterize Malware Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28 System Call AnalysisModel evaluation methodsMachine Learning Algorithm 2017.11.10 2025.05.28 Literature Database
Elliptical modeling and pattern analysis for perturbation models and classfication Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22 Data Privacy AssessmentPrivacy-Preserving Machine LearningModel evaluation methods 2017.10.22 2025.05.28 Literature Database
A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03 Model evaluation methodsConvergence PropertyDefinition of Mathematical Concepts 2017.10.21 2025.05.28 Literature Database
Solving the “false positives” problem in fraud prediction Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20 Data Extraction and AnalysisModel evaluation methodsevaluation metrics 2017.10.20 2025.05.28 Literature Database