Structural Robustness for Deep Learning Architectures Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11 Attack MethodMachine Learning ApplicationMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29 Robustness Verification MethodAdversarial ExampleMachine Learning Application 2019.08.29 2025.05.28 Literature Database
Adversarial Edit Attacks for Tree Data Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27 Adversarial ExampleAdversarial Attack DetectionMachine Learning Application 2019.08.25 2025.05.28 Literature Database
Adversary-resilient Distributed and Decentralized Statistical Inference and Machine Learning: An Overview of Recent Advances Under the Byzantine Threat Model Authors: Zhixiong Yang, Arpita Gang, Waheed U. Bajwa | Published: 2019-08-23 | Updated: 2020-06-02 Consensus Formation AlgorithmMachine Learning ApplicationDecentralized Processing 2019.08.23 2025.05.28 Literature Database
A Compendium on Network and Host based Intrusion Detection Systems Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.06 2025.05.28 Literature Database
A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05 Data Origins and EvolutionData DependencyMachine Learning Application 2019.04.05 2025.05.28 Literature Database
Malware Detection using Machine Learning and Deep Learning Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.04 2025.05.28 Literature Database
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04 Adversarial attackMachine Learning AlgorithmMachine Learning Application 2019.04.04 2025.05.28 Literature Database
Active Learning for Network Intrusion Detection Authors: Amir Ziai | Published: 2019-04-02 Active LearningData PreprocessingMachine Learning Application 2019.04.02 2025.05.28 Literature Database
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02 Ensemble LearningMachine Learning Applicationevaluation metrics 2019.04.02 2025.05.28 Literature Database