An Embarrassingly Simple Approach for Intellectual Property Rights Protection on Recurrent Neural Networks Authors: Zhi Qin Tan, Hao Shan Wong, Chee Seng Chan | Published: 2022-10-03 | Updated: 2022-10-04 DNN IP Protection MethodPerformance Evaluation MetricsIntellectual Property Protection 2022.10.03 2025.05.28 Literature Database
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01 Performance Evaluation MetricsTime-Related FeaturesFeature Importance Analysis 2022.10.01 2025.05.28 Literature Database
Anomaly localization for copy detection patterns through print estimations Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29 Data Protection MethodUser Authentication SystemPerformance Evaluation Metrics 2022.09.29 2025.05.28 Literature Database
Unifying Gradients to Improve Real-world Robustness for Deep Networks Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24 Robustness EvaluationPerformance Evaluation MetricsAttack Method 2022.08.12 2025.05.28 Literature Database
Verifiable Encodings for Secure Homomorphic Analytics Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04 Privacy TechniquePerformance Evaluation MetricsEvaluation Method 2022.07.28 2025.05.28 Literature Database
HyperImpute: Generalized Iterative Imputation with Automatic Model Selection Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15 AlgorithmHyperparameter TuningPerformance Evaluation Metrics 2022.06.15 2025.05.28 Literature Database
Reconstructing Training Data from Trained Neural Networks Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05 Hyperparameter TuningPerformance Evaluation MetricsAdversarial Learning 2022.06.15 2025.05.28 Literature Database
Learn to Adapt: Robust Drift Detection in Security Domain Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15 Drift Detection MethodPerformance Evaluation MetricsAdversarial Learning 2022.06.15 2025.05.28 Literature Database
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing Authors: Helio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia C. Fernandes | Published: 2022-05-23 Convergence PropertyPerformance Evaluation MetricsLoss Function 2022.05.23 2025.05.28 Literature Database
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17 Dataset evaluationPerformance Evaluation MetricsFeature Selection Method 2022.03.15 2025.05.28 Literature Database