Machine Learning Application

WAFFLE: Watermarking in Federated Learning

Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22
Watermarking
Poisoning
Machine Learning Application

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09
Performance Evaluation Metrics
Attack Detection
Machine Learning Application

From Predictions to Decisions: Using Lookahead Regularization

Authors: Nir Rosenfeld, Sophie Hilgard, Sai Srivatsa Ravindranath, David C. Parkes | Published: 2020-06-20 | Updated: 2020-06-23
Algorithm Design
Uncertainty Estimation
Machine Learning Application

Robust Variational Autoencoder for Tabular Data with Beta Divergence

Authors: Haleh Akrami, Sergul Aydore, Richard M. Leahy, Anand A. Joshi | Published: 2020-06-15 | Updated: 2020-06-16
Algorithm Design
Machine Learning Application
Deep Learning Method

Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning

Authors: Pieter Delobelle, Paul Temple, Gilles Perrouin, Benoît Frénay, Patrick Heymans, Bettina Berendt | Published: 2020-05-14 | Updated: 2020-09-01
Fairness evaluation
Adversarial Example
Machine Learning Application

Data Augmentation for Deep Candlestick Learner

Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29
Candlestick Pattern
Data Dependency
Machine Learning Application

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01
Malware Detection Method
Machine Learning Application
Generative Model

Differentially Private Naive Bayes Classifier using Smooth Sensitivity

Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19
Privacy Protection Method
Machine Learning Application
Computational Efficiency

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Machine Learning Application

Explainable Deep Convolutional Candlestick Learner

Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29
Candlestick Pattern
Adversarial Perturbation Techniques
Machine Learning Application