Multiple perspectives HMM-based feature engineering for credit card fraud detection Authors: Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Olivier Caelen, Liyun He-Guelton, Sylvie Calabretto, Michael Granitzer | Published: 2019-05-15 Dataset GenerationModel EvaluationRole of Machine Learning 2019.05.15 2025.05.28 Literature Database
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14 Trigger DetectionModel EvaluationAdversarial Attack Methods 2019.01.12 2025.05.28 Literature Database
MLCapsule: Guarded Offline Deployment of Machine Learning as a Service Authors: Lucjan Hanzlik, Yang Zhang, Kathrin Grosse, Ahmed Salem, Max Augustin, Michael Backes, Mario Fritz | Published: 2018-08-01 | Updated: 2019-02-06 Membership InferenceModel Extraction AttackModel Evaluation 2018.08.01 2025.05.28 Literature Database
Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27 Model EvaluationMachine Learning ApplicationFeature Selection Method 2018.07.27 2025.05.28 Literature Database
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Training ProtocolModel EvaluationFeature Selection Method 2018.07.27 2025.05.28 Literature Database
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Backdoor DetectionModel EvaluationMachine Learning Application 2018.07.27 2025.05.28 Literature Database
Limitations of the Lipschitz constant as a defense against adversarial examples Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25 Model EvaluationRobustness EvaluationAdversarial Example 2018.07.25 2025.05.28 Literature Database
MOBA-Slice: A Time Slice Based Evaluation Framework of Relative Advantage between Teams in MOBA Games Authors: Lijun Yu, Dawei Zhang, Xiangqun Chen, Xing Xie | Published: 2018-07-22 Game TheoryModel Design and AccuracyModel Evaluation 2018.07.22 2025.05.28 Literature Database
A Preliminary Study On the Sustainability of Android Malware Detection Authors: Haipeng Cai | Published: 2018-07-22 | Updated: 2018-08-03 Malware DetectionModel EvaluationBehavior Analysis Method 2018.07.22 2025.05.28 Literature Database
Redundancy Coefficient Gradual Up-weighting-based Mutual Information Feature Selection Technique for Crypto-ransomware Early Detection Authors: Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid | Published: 2018-07-22 Model EvaluationEarly Detection MethodFeature Selection Method 2018.07.22 2025.05.28 Literature Database