Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13 FDI Attack Detection MethodsPerformance EvaluationAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning Authors: Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper | Published: 2017-11-10 | Updated: 2018-04-02 Multi-Class ClassificationPerformance EvaluationFeature Extraction Method 2017.11.10 2025.05.28 Literature Database
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains Authors: Tegjyot Singh Sethi, Mehmed Kantardzic | Published: 2017-03-23 Performance EvaluationAttack Pattern ExtractionAdversarial Example 2017.03.23 2025.05.28 Literature Database
Implicit Sensor-based Authentication of Smartphone Users with Smartwatch Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10 Security AnalysisPerformance EvaluationBehavioral Authentication System 2017.03.10 2025.05.28 Literature Database