Performance Evaluation Method

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15
Query Generation Method
Performance Evaluation Method
Adversarial Training

Online Multivariate Anomaly Detection and Localization for High-dimensional Settings

Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14
DDoS Attack
Performance Evaluation Method
High-Dimensional Data Analysis

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16
Data Preprocessing
Performance Evaluation Method
Attack Chain Analysis

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic

Authors: Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng | Published: 2019-05-15 | Updated: 2019-12-17
UAV Security
Performance Evaluation Method
Role of Machine Learning

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14
Detection of Poison Data for Backdoor Attacks
Poisoning
Performance Evaluation Method

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02
IoT Traffic Characteristics
Performance Evaluation Method
Feature Selection Method

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11
Performance Evaluation Method
Watermarking Technology
Security of Voice Recognition Systems

EMULATOR vs REAL PHONE: Android Malware Detection Using Machine Learning

Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2017-03-31
Online Malware Detection
Dynamic Analysis Method
Performance Evaluation Method