Logic Locking at the Frontiers of Machine Learning: A Survey on Developments and Opportunities Authors: Dominik Sisejkovic, Lennart M. Reimann, Elmira Moussavi, Farhad Merchant, Rainer Leupers | Published: 2021-07-05 | Updated: 2021-11-23 Attack EvaluationMachine Learning ApplicationMachine Learning Technology 2021.07.05 2025.05.28 Literature Database
Machine Learning for Malware Evolution Detection Authors: Lolitha Sresta Tupadha, Mark Stamp | Published: 2021-07-04 Malware EvolutionMachine Learning ApplicationMachine Learning Technology 2021.07.04 2025.05.28 Literature Database
Residual Error: a New Performance Measure for Adversarial Robustness Authors: Hossein Aboutalebi, Mohammad Javad Shafiee, Michelle Karg, Christian Scharfenberger, Alexander Wong | Published: 2021-06-18 Model Design and AccuracyClassification Pattern AnalysisMachine Learning Application 2021.06.18 2025.05.28 Literature Database
Bad Characters: Imperceptible NLP Attacks Authors: Nicholas Boucher, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2021-06-18 | Updated: 2021-12-11 Cyber AttackPrompt InjectionMachine Learning Application 2021.06.18 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 Performance EvaluationMachine Learning ApplicationEvaluation Method 2021.03.07 2025.05.28 Literature Database
Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework Authors: Pranay Sharma, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Xue Lin, Pramod K. Varshney | Published: 2020-12-21 Optimization MethodsMachine Learning Application 2020.12.21 2025.05.28 Literature Database
Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis Authors: Brian Coyle, Mina Doosti, Elham Kashefi, Niraj Kumar | Published: 2020-12-21 Loss FunctionMachine Learning ApplicationQuantum Cryptanalysis 2020.12.21 2025.05.28 Literature Database
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism Authors: Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang | Published: 2020-12-19 Incentive MechanismMembership InferenceMachine Learning Application 2020.12.19 2025.05.28 Literature Database
Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16 ML-Based IDSMachine Learning ApplicationComplexity of the Environment 2020.12.16 2025.05.28 Literature Database
Optimized Random Forest Model for Botnet Detection Based on DNS Queries Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16 DDoS AttackMachine Learning ApplicationDefense Method 2020.12.16 2025.05.28 Literature Database