Model Evaluation

Controlling Neural Level Sets

Authors: Matan Atzmon, Niv Haim, Lior Yariv, Ofer Israelov, Haggai Maron, Yaron Lipman | Published: 2019-05-28 | Updated: 2019-10-27
Model Evaluation
Optimization Problem
Generative Model

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder | Published: 2019-05-28 | Updated: 2019-11-27
Poisoning
Model Evaluation
Adversarial Learning

Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models

Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06
Dataset Analysis
Model Evaluation
Attack Detection

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28
Dataset Analysis
Model Evaluation
Anomaly Detection Algorithm

Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors

Authors: Firat Coskun Dalgic, Ahmet Selman Bozkir, Murat Aydos | Published: 2019-05-19
Model Evaluation
Feature Extraction Method
Visual Techniques

Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain

Authors: Lei Bu, Yuchao Duan, Fu Song, Zhe Zhao | Published: 2019-05-19 | Updated: 2020-04-26
Model Evaluation
Performance Evaluation Metrics
Taxonomy of Attacks

Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning

Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20
Model Evaluation
Ad Blocking System
Information Security

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17
Poisoning
Model Evaluation
Performance Evaluation Method

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16
Data Preprocessing
Malware Detection Method
Model Evaluation

Automatic Malware Description via Attribute Tagging and Similarity Embedding

Authors: Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin | Published: 2019-05-15 | Updated: 2020-01-23
Dataset Generation
Malware Detection Method
Model Evaluation