Machine Learning Method

OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning

Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15
Byzantine Resilience
Machine Learning Method
Federated Learning

Segmented Federated Learning for Adaptive Intrusion Detection System

Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02
Cybersecurity
Machine Learning Method
Federated Learning

Robust and Fully-Dynamic Coreset for Continuous-and-Bounded Learning (With Outliers) Problems

Authors: Zixiu Wang, Yiwen Guo, Hu Ding | Published: 2021-06-30 | Updated: 2022-01-21
Core Set Construction
Robustness
Machine Learning Method

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31
ML-Based IDS
Machine Learning Method
Anomaly Detection Method

Exploring Edge TPU for Network Intrusion Detection in IoT

Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30
ML-Based IDS
Model Selection
Machine Learning Method

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30
Data Preprocessing
Classification of Malicious Actors
Machine Learning Method

Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators

Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14
Performance Evaluation
Machine Learning Method
Generative Adversarial Network

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19
Attack Type
Machine Learning Method
Vulnerability Management

Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis

Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22
Blockchain Technology
Machine Learning Method
Linear Model

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30
Data Generation Method
Machine Learning Method
Research Methodology