On the Security Risks of AutoML Authors: Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2021-10-12 Membership InferenceModel SelectionAdversarial Attack Methods 2021.10.12 2025.05.28 Literature Database
Improving Vulnerability Prediction of JavaScript Functions Using Process Metrics Authors: Tamás Viszkok, Péter Hegedűs, Rudolf Ferenc | Published: 2021-05-16 Class ImbalanceModel SelectionVulnerability Management 2021.05.16 2025.05.28 Literature Database
Cybersecurity Anomaly Detection in Adversarial Environments Authors: David A. Bierbrauer, Alexander Chang, Will Kritzer, Nathaniel D. Bastian | Published: 2021-05-14 | Updated: 2021-11-02 ML-Based IDSModel SelectionAdversarial Learning 2021.05.14 2025.05.28 Literature Database
Analysis of Machine Learning Approaches to Packing Detection Authors: Charles-Henry Bertrand Van Ouytsel, Thomas Given-Wilson, Jeremy Minet, Julian Roussieau, Axel Legay | Published: 2021-05-02 PE Malware ClassificationModel SelectionFeature Selection Method 2021.05.02 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 ML-Based IDSModel SelectionMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Optimal Explanations of Linear Models Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08 Model SelectionResearch Methodologyloss of Interpretability 2019.07.08 2025.05.28 Literature Database
The Price of Interpretability Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08 Model SelectionOptimization StrategyInterpretability 2019.07.08 2025.05.28 Literature Database
Intelligent Systems Design for Malware Classification Under Adversarial Conditions Authors: Sean M. Devine, Nathaniel D. Bastian | Published: 2019-07-06 Dataset AnalysisModel SelectionMachine Learning Framework 2019.07.06 2025.05.28 Literature Database
Data Science Methodology for Cybersecurity Projects Authors: Farhad Foroughi, Peter Luksch | Published: 2018-03-12 Data Science MethodologyModel SelectionUser Behavior Analysis 2018.03.12 2025.05.28 Literature Database