Machine Learning Application

Structural Robustness for Deep Learning Architectures

Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11
Attack Method
Machine Learning Application
Machine Learning Method

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29
Robustness Verification Method
Adversarial Example
Machine Learning Application

Adversarial Edit Attacks for Tree Data

Authors: Benjamin Paaßen | Published: 2019-08-25 | Updated: 2019-08-27
Adversarial Example
Adversarial Attack Detection
Machine Learning Application

Adversary-resilient Distributed and Decentralized Statistical Inference and Machine Learning: An Overview of Recent Advances Under the Byzantine Threat Model

Authors: Zhixiong Yang, Arpita Gang, Waheed U. Bajwa | Published: 2019-08-23 | Updated: 2020-06-02
Consensus Formation Algorithm
Machine Learning Application
Decentralized Processing

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment

Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05
Data Origins and Evolution
Data Dependency
Machine Learning Application

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
Adversarial attack
Machine Learning Algorithm
Machine Learning Application

Active Learning for Network Intrusion Detection

Authors: Amir Ziai | Published: 2019-04-02
Active Learning
Data Preprocessing
Machine Learning Application

Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier

Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02
Ensemble Learning
Machine Learning Application
evaluation metrics