Machine Learning Algorithms In User Authentication Schemes Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15 User Activity AnalysisPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.15 2025.05.28 Literature Database
A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14 Model SelectionPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
Pervasive Label Errors in Test Sets Destabilize Machine Learning Benchmarks Authors: Curtis G. Northcutt, Anish Athalye, Jonas Mueller | Published: 2021-03-26 | Updated: 2021-11-07 Data CurationLabel Inference AttackPerformance Evaluation Metrics 2021.03.26 2025.05.28 Literature Database
Towards Practical Robustness Analysis for DNNs based on PAC-Model Learning Authors: Renjue Li, Pengfei Yang, Cheng-Chao Huang, Youcheng Sun, Bai Xue, Lijun Zhang | Published: 2021-01-25 | Updated: 2022-04-13 PAC RobustnessPerformance Evaluation MetricsDeep Learning Technology 2021.01.25 2025.05.28 Literature Database
Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms Evaluation Authors: Wenhao Ding, Baiming Chen, Bo Li, Kim Ji Eun, Ding Zhao | Published: 2020-09-16 | Updated: 2020-12-26 Data GenerationPerformance Evaluation MetricsDeep Reinforcement Learning 2020.09.16 2025.05.28 Literature Database
Dual-Mandate Patrols: Multi-Armed Bandits for Green Security Authors: Lily Xu, Elizabeth Bondi, Fei Fang, Andrew Perrault, Kai Wang, Milind Tambe | Published: 2020-09-14 | Updated: 2024-04-26 Reward Mechanism DesignPerformance Evaluation MetricsSelection and Evaluation of Optimization Algorithms 2020.09.14 2025.05.28 Literature Database
Machine Unlearning for Random Forests Authors: Jonathan Brophy, Daniel Lowd | Published: 2020-09-11 | Updated: 2021-06-11 Data Deletion AlgorithmMachine learningPerformance Evaluation Metrics 2020.09.11 2025.05.28 Literature Database
Early Identification of Services in HTTPS Traffic Authors: Wazen M. Shbair, Thibault Cholez, Jerome Francois, Isabelle Chrisment | Published: 2020-08-19 Performance Evaluation MetricsMachine Learning MethodCommunication Efficiency 2020.08.19 2025.05.28 Literature Database
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09 Performance Evaluation MetricsAttack DetectionMachine Learning Application 2020.08.09 2025.05.28 Literature Database
On Intrinsic Dataset Properties for Adversarial Machine Learning Authors: Jeffrey Z. Pan, Nicholas Zufelt | Published: 2020-05-19 PoisoningPerformance Evaluation MetricsMachine Learning Method 2020.05.19 2025.05.28 Literature Database