Controlling Neural Level Sets Authors: Matan Atzmon, Niv Haim, Lior Yariv, Ofer Israelov, Haggai Maron, Yaron Lipman | Published: 2019-05-28 | Updated: 2019-10-27 Model EvaluationOptimization ProblemGenerative Model 2019.05.28 2025.05.28 Literature Database
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics Authors: Yi Xiang Marcus Tan, Alfonso Iacovazzi, Ivan Homoliak, Yuval Elovici, Alexander Binder | Published: 2019-05-28 | Updated: 2019-11-27 PoisoningModel EvaluationAdversarial Learning 2019.05.28 2025.05.28 Literature Database
Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06 Dataset AnalysisModel EvaluationAttack Detection 2019.05.28 2025.05.28 Literature Database
Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28 Dataset AnalysisModel EvaluationAnomaly Detection Algorithm 2019.05.28 2025.05.28 Literature Database
Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors Authors: Firat Coskun Dalgic, Ahmet Selman Bozkir, Murat Aydos | Published: 2019-05-19 Model EvaluationFeature Extraction MethodVisual Techniques 2019.05.19 2025.05.28 Literature Database
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain Authors: Lei Bu, Yuchao Duan, Fu Song, Zhe Zhao | Published: 2019-05-19 | Updated: 2020-04-26 Model EvaluationPerformance Evaluation MetricsTaxonomy of Attacks 2019.05.19 2025.05.28 Literature Database
Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20 Model EvaluationAd Blocking SystemInformation Security 2019.05.17 2025.05.28 Literature Database
POPQORN: Quantifying Robustness of Recurrent Neural Networks Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17 PoisoningModel EvaluationPerformance Evaluation Method 2019.05.17 2025.05.28 Literature Database
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16 Data PreprocessingMalware Detection MethodModel Evaluation 2019.05.16 2025.05.28 Literature Database
Automatic Malware Description via Attribute Tagging and Similarity Embedding Authors: Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin | Published: 2019-05-15 | Updated: 2020-01-23 Dataset GenerationMalware Detection MethodModel Evaluation 2019.05.15 2025.05.28 Literature Database