Machine Learning Algorithm

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice?

Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05
Experimental Validation
Mathematical Analysis
Machine Learning Algorithm

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13
Code Generation
Experimental Validation
Machine Learning Algorithm

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02
Adversarial Attack Methods
Machine Learning Algorithm
Speech Enhancement Technology

A Deep Belief Network Based Machine Learning System for Risky Host Detection

Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29
Risk Management
Performance Evaluation Metrics
Machine Learning Algorithm

Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient

Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16
Model Design
Machine Learning Algorithm
Machine Learning Framework

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

Authors: Mouhammd Alkasassbeh | Published: 2017-12-27
Machine Learning Algorithm
Feature Selection Method
Communication System

Query-limited Black-box Attacks to Classifiers

Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23
Query Generation Method
Adversarial Attack Methods
Machine Learning Algorithm

Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach

Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16
ML-Based IDS
Proactive Defense
Machine Learning Algorithm

Improving Malware Detection Accuracy by Extracting Icon Information

Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10
Clustering methods
Machine Learning Algorithm
Image Feature Extraction