Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 Data CollectionModel evaluation methodsMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database
Dynamic Analysis of Executables to Detect and Characterize Malware Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28 System Call AnalysisModel evaluation methodsMachine Learning Algorithm 2017.11.10 2025.05.28 Literature Database
Elliptical modeling and pattern analysis for perturbation models and classfication Authors: Shan Suthaharan, Weining Shen | Published: 2017-10-22 Data Privacy AssessmentPrivacy-Preserving Machine LearningModel evaluation methods 2017.10.22 2025.05.28 Literature Database
A Novel Stochastic Stratified Average Gradient Method: Convergence Rate and Its Complexity Authors: Aixiang Chen, Bingchuan Chen, Xiaolong Chai, Rui Bian, Hengguang Li | Published: 2017-10-21 | Updated: 2017-12-03 Model evaluation methodsConvergence PropertyDefinition of Mathematical Concepts 2017.10.21 2025.05.28 Literature Database
Solving the “false positives” problem in fraud prediction Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20 Data Extraction and AnalysisModel evaluation methodsevaluation metrics 2017.10.20 2025.05.28 Literature Database