OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15 Byzantine ResilienceMachine Learning MethodFederated Learning 2021.07.12 2025.05.28 Literature Database
Segmented Federated Learning for Adaptive Intrusion Detection System Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02 CybersecurityMachine Learning MethodFederated Learning 2021.07.02 2025.05.28 Literature Database
Robust and Fully-Dynamic Coreset for Continuous-and-Bounded Learning (With Outliers) Problems Authors: Zixiu Wang, Yiwen Guo, Hu Ding | Published: 2021-06-30 | Updated: 2022-01-21 Core Set ConstructionRobustnessMachine Learning Method 2021.06.30 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 ML-Based IDSMachine Learning MethodAnomaly Detection Method 2021.03.31 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 ML-Based IDSModel SelectionMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 Data PreprocessingClassification of Malicious ActorsMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14 Performance EvaluationMachine Learning MethodGenerative Adversarial Network 2021.01.12 2025.05.28 Literature Database
SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19 Attack TypeMachine Learning MethodVulnerability Management 2021.01.07 2025.05.28 Literature Database
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22 Blockchain TechnologyMachine Learning MethodLinear Model 2021.01.07 2025.05.28 Literature Database
Stack-based Buffer Overflow Detection using Recurrent Neural Networks Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30 Data Generation MethodMachine Learning MethodResearch Methodology 2020.12.30 2025.05.28 Literature Database