WAFFLE: Watermarking in Federated Learning Authors: Buse Gul Atli, Yuxi Xia, Samuel Marchal, N. Asokan | Published: 2020-08-17 | Updated: 2021-07-22 WatermarkingPoisoningMachine Learning Application 2020.08.17 2025.05.28 Literature Database
Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09 Performance Evaluation MetricsAttack DetectionMachine Learning Application 2020.08.09 2025.05.28 Literature Database
From Predictions to Decisions: Using Lookahead Regularization Authors: Nir Rosenfeld, Sophie Hilgard, Sai Srivatsa Ravindranath, David C. Parkes | Published: 2020-06-20 | Updated: 2020-06-23 Algorithm DesignUncertainty EstimationMachine Learning Application 2020.06.20 2025.05.28 Literature Database
Robust Variational Autoencoder for Tabular Data with Beta Divergence Authors: Haleh Akrami, Sergul Aydore, Richard M. Leahy, Anand A. Joshi | Published: 2020-06-15 | Updated: 2020-06-16 Algorithm DesignMachine Learning ApplicationDeep Learning Method 2020.06.15 2025.05.28 Literature Database
Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning Authors: Pieter Delobelle, Paul Temple, Gilles Perrouin, Benoît Frénay, Patrick Heymans, Bettina Berendt | Published: 2020-05-14 | Updated: 2020-09-01 Fairness evaluationAdversarial ExampleMachine Learning Application 2020.05.14 2025.05.28 Literature Database
Data Augmentation for Deep Candlestick Learner Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29 Candlestick PatternData DependencyMachine Learning Application 2020.05.14 2025.05.28 Literature Database
Botnet Detection Using Recurrent Variational Autoencoder Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01 Malware Detection MethodMachine Learning ApplicationGenerative Model 2020.04.01 2025.05.28 Literature Database
Differentially Private Naive Bayes Classifier using Smooth Sensitivity Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19 Privacy Protection MethodMachine Learning ApplicationComputational Efficiency 2020.03.31 2025.05.28 Literature Database
Identifying Audio Adversarial Examples via Anomalous Pattern Detection Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsMachine Learning Application 2020.02.13 2025.05.28 Literature Database
Explainable Deep Convolutional Candlestick Learner Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29 Candlestick PatternAdversarial Perturbation TechniquesMachine Learning Application 2020.01.08 2025.05.28 Literature Database