Revocable Federated Learning: A Benchmark of Federated Forest Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08 Privacy ProtectionEfficiency EvaluationPerformance Evaluation 2019.11.08 2025.05.28 Literature Database
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26 Performance EvaluationDeep Learning TechnologyImage Feature Extraction 2019.10.24 2025.05.28 Literature Database
Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks Authors: Alexander Levine, Soheil Feizi | Published: 2019-10-23 Wasserstein DistancePerformance EvaluationAdversarial Example 2019.10.23 2025.05.28 Literature Database
Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29 Adversarial LearningPerformance EvaluationAdversarial Transferability 2019.10.22 2025.05.28 Literature Database
GraphSAC: Detecting anomalies in large-scale graphs Authors: Vassilis N. Ioannidis, Dimitris Berberidis, Georgios B. Giannakis | Published: 2019-10-21 Graph Representation LearningData Contamination DetectionPerformance Evaluation 2019.10.21 2025.05.28 Literature Database
Learning to Learn by Zeroth-Order Oracle Authors: Yangjun Ruan, Yuanhao Xiong, Sashank Reddi, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2019-10-21 | Updated: 2020-02-07 Performance EvaluationLoss TermSelection and Evaluation of Optimization Algorithms 2019.10.21 2025.05.28 Literature Database
Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28 Network Traffic AnalysisPerformance EvaluationMachine Learning Method 2019.10.21 2025.05.28 Literature Database
Deep k-NN Defense against Clean-label Data Poisoning Attacks Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13 Backdoor AttackPerformance EvaluationDetection of Poisonous Data 2019.09.29 2025.05.28 Literature Database
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 Security AnalysisPerformance EvaluationAdversarial Learning 2019.09.13 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 Performance EvaluationAdversarial ExampleAdversarial Learning 2019.09.13 2025.05.28 Literature Database