Heterogeneous Graph Neural Networks for Malicious Account Detection Authors: Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, Le Song | Published: 2020-02-27 Graph Neural NetworkGraph PrivacyMachine Learning Method 2020.02.27 2025.05.28 Literature Database
IoT Device Identification Using Deep Learning Authors: Jaidip Kotak, Yuval Elovici | Published: 2020-02-25 Data Management SystemPerformance EvaluationMachine Learning Method 2020.02.25 2025.05.28 Literature Database
Stealing Black-Box Functionality Using The Deep Neural Tree Architecture Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23 Training Data Extraction MethodTraining MethodMachine Learning Method 2020.02.23 2025.05.28 Literature Database
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 Adversarial LearningAdversarial Attack DetectionMachine Learning Method 2020.01.27 2025.05.28 Literature Database
Secure and Robust Machine Learning for Healthcare: A Survey Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21 Medical Image AnalysisAdversarial ExampleMachine Learning Method 2020.01.21 2025.05.28 Literature Database
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14 DDoS Attack DetectionNetwork Threat DetectionMachine Learning Method 2020.01.21 2025.05.28 Literature Database
Pelican: A Deep Residual Network for Network Intrusion Detection Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08 Network Threat DetectionMachine Learning MethodDeep Reinforcement Learning 2020.01.19 2025.05.28 Literature Database
IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing Authors: Maurizio Aiello, Enrico Cambiaso, Roberto Canonico, Leonardo Maccari, Marco Mellia, Antonio Pescapè, Ivan Vaccari | Published: 2020-01-17 Privacy Enhancing TechnologyUsabilityMachine Learning Method 2020.01.17 2025.05.28 Literature Database
Cyber Attack Detection thanks to Machine Learning Algorithms Authors: Antoine Delplace, Sheryl Hermoso, Kristofer Anandita | Published: 2020-01-17 Machine Learning MethodFeature EngineeringStatistical Methods 2020.01.17 2025.05.28 Literature Database
A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay | Published: 2019-12-02 Performance EvaluationMachine Learning MethodCrime Detection 2019.12.02 2025.05.28 Literature Database