Machine Learning Algorithm

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30
Data Generation
Poisoning
Machine Learning Algorithm

Unveiling the potential of Graph Neural Networks for robust Intrusion Detection

Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30
ML-Based IDS
Robustness
Machine Learning Algorithm

Who’s Afraid of Thomas Bayes?

Authors: Erick Galinkin | Published: 2021-07-30
Privacy Leakage
Quantification of Uncertainty
Machine Learning Algorithm

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation

Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29
Privacy Leakage
Model Design
Machine Learning Algorithm

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29
Algorithm
Machine Learning Algorithm
Face Recognition System

Poisoning the Search Space in Neural Architecture Search

Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28
Data-Driven Vulnerability Assessment
Efficiency Evaluation
Machine Learning Algorithm

On the (Un-)Avoidability of Adversarial Examples

Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24
Robustness Evaluation
Adversarial Example
Machine Learning Algorithm

Machine learning for risk assessment in gender-based crime

Authors: Ángel González-Prieto, Antonio Brú, Juan Carlos Nuño, José Luis González-Álvarez | Published: 2021-06-22
Recidivism Prediction Model
Machine Learning Algorithm
Police Protection Assessment

Phishing Detection through Email Embeddings

Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28
Email Security
Machine Learning Algorithm
Feature Engineering

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26
Challenges of Data Labeling
Machine Learning Algorithm
Research Methodology