Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19 Malware DetectionPerformance Evaluation MetricsResearch Methodology 2018.10.19 2025.05.28 Literature Database
ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11 Robustness Improvement MethodPerformance Evaluation MetricsAdversarial Learning 2018.10.16 2025.05.28 Literature Database
Malware triage for early identification of Advanced Persistent Threat activities Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16 Malware DetectionPerformance Evaluation MetricsFeature Selection Method 2018.10.16 2025.05.28 Literature Database
Identification of Wearable Devices with Bluetooth Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley | Published: 2018-09-27 IoT SecurityIoT Traffic CharacteristicsPerformance Evaluation Metrics 2018.09.27 2025.05.28 Literature Database
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2018-09-16 Malware DetectionPerformance Evaluation Metrics 2018.09.16 2025.05.28 Literature Database
Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks Authors: Amara Dinesh Kumar | Published: 2018-05-11 Data PreprocessingPerformance Evaluation MetricsDeep Learning Model 2018.05.11 2025.05.28 Literature Database
Classification of Epileptic EEG Signals by Wavelet based CFC Authors: Amirmasoud Ahmadi, Mahsa Behroozi, Vahid Shalchyan, Mohammad Reza Daliri | Published: 2018-05-04 Performance Evaluation MetricsTime Series AnalysisRobustness of Watermarking Techniques 2018.05.04 2025.05.28 Literature Database
Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 Detection of DeepfakesPerformance Evaluation MetricsDeep Learning Method 2018.03.29 2025.05.28 Literature Database
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 Performance Evaluation MetricsAdversarial ExampleAdversarial Learning 2018.03.19 2025.05.28 Literature Database
A Deep Belief Network Based Machine Learning System for Risky Host Detection Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29 Risk ManagementPerformance Evaluation MetricsMachine Learning Algorithm 2017.12.29 2025.05.28 Literature Database