Performance Evaluation

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method

Improving Query Efficiency of Black-box Adversarial Attack

Authors: Yang Bai, Yuyuan Zeng, Yong Jiang, Yisen Wang, Shu-Tao Xia, Weiwei Guo | Published: 2020-09-24 | Updated: 2020-09-25
Performance Evaluation
Selection and Evaluation of Optimization Algorithms
Generative Model

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20
Performance Evaluation
Malicious Website Detection
Information Security

Manifold attack

Authors: Khanh-Hung Tran, Fred-Maurice Ngole-Mboula, Jean-Luc Starck | Published: 2020-09-13 | Updated: 2021-03-17
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology

Quantifying the Preferential Direction of the Model Gradient in Adversarial Training With Projected Gradient Descent

Authors: Ricardo Bigolin Lanfredi, Joyce D. Schroeder, Tolga Tasdizen | Published: 2020-09-10 | Updated: 2023-04-20
Poisoning
Performance Evaluation
Adversarial Attack Methods

Membership Leakage in Label-Only Exposures

Authors: Zheng Li, Yang Zhang | Published: 2020-07-30 | Updated: 2021-09-17
Membership Inference
Performance Evaluation
Attack Method

DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30
Performance Evaluation
Deep Learning
Computational Efficiency

A General Framework For Detecting Anomalous Inputs to DNN Classifiers

Authors: Jayaram Raghuram, Varun Chandrasekaran, Somesh Jha, Suman Banerjee | Published: 2020-07-29 | Updated: 2021-06-17
Performance Evaluation
Attack Method
Deep Learning