User Behavior Analysis

Unsupervised Learning for Trustworthy IoT

Authors: Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took | Published: 2018-05-25
Data-Driven Clustering
User Behavior Analysis
Adversarial Attack Detection

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Under the Underground: Predicting Private Interactions in Underground Forums

Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11
Darknet Analysis
Membership Inference
User Behavior Analysis

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
User Behavior Analysis
User Behavior Analysis
Communication Analysis

Automatic Detection of Online Jihadist Hate Speech

Authors: Tom De Smedt, Guy De Pauw, Pieter Van Ostaeyen | Published: 2018-03-13
Content Moderation
Profile Characteristic Analysis
User Behavior Analysis

Data Science Methodology for Cybersecurity Projects

Authors: Farhad Foroughi, Peter Luksch | Published: 2018-03-12
Data Science Methodology
Model Selection
User Behavior Analysis

Actions Speak Louder Than Goals: Valuing Player Actions in Soccer

Authors: Tom Decroos, Lotte Bransen, Jan Van Haaren, Jesse Davis | Published: 2018-02-18 | Updated: 2019-07-10
Privacy Management
User Behavior Analysis
Machine Learning Method

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers

Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25
Model Evaluation
User Behavior Analysis
Risk Assessment

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30
Data Collection
User Behavior Analysis
Anomaly Detection Algorithm