Machine Learning Application

Android Botnet Detection using Convolutional Neural Networks

Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27
Botnet Detection
Model Performance Evaluation
Machine Learning Application

Network Intrusion Detection based on LSTM and Feature Embedding

Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26
Attack Type
Machine Learning Application
Deep Learning-Based IDS

Privacy preserving Neural Network Inference on Encrypted Data with GPUs

Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26
Model Design
Machine Learning Application
Image Feature Extraction

Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning

Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25
Blockchain Economics
Model Performance Evaluation
Machine Learning Application

Lower Bounds on Adversarial Robustness from Optimal Transport

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30
Taxonomy of Attacks
Adversarial attack
Machine Learning Application

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2019-09-23
Cyber Threat
Data Collection
Machine Learning Application

Multi-task Learning and Catastrophic Forgetting in Continual Reinforcement Learning

Authors: João Ribeiro, Francisco S. Melo, João Dias | Published: 2019-09-22
Reinforcement Learning Attack
Machine Learning Application
Machine Learning Technology

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21
Privacy Protection Mechanism
Information Security
Machine Learning Application

Towards Federated Graph Learning for Collaborative Financial Crimes Detection

Authors: Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran | Published: 2019-09-19 | Updated: 2019-10-02
Graph Representation Learning
Risk Management
Machine Learning Application

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12
Sensor State Estimation
Attack Method
Machine Learning Application