Machine Learning Method

A Survey on Unknown Presentation Attack Detection for Fingerprint

Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17
Algorithm
Machine Learning Method

NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16
Performance Evaluation Metrics
Machine Learning Method
Deep Learning Technology

Encryption Inspired Adversarial Defense for Visual Classification

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16
Machine Learning Algorithm
Machine Learning Method
Defense Effectiveness Analysis

Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness

Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07
Algorithm
Machine Learning Algorithm
Machine Learning Method

Heterogeneous Graph Neural Networks for Malicious Account Detection

Authors: Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, Le Song | Published: 2020-02-27
Graph Neural Network
Graph Privacy
Machine Learning Method

IoT Device Identification Using Deep Learning

Authors: Jaidip Kotak, Yuval Elovici | Published: 2020-02-25
Data Management System
Performance Evaluation
Machine Learning Method

Stealing Black-Box Functionality Using The Deep Neural Tree Architecture

Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23
Training Data Extraction Method
Training Method
Machine Learning Method

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

Authors: Ibrahim Yilmaz | Published: 2020-01-27
Adversarial Learning
Adversarial Attack Detection
Machine Learning Method

Secure and Robust Machine Learning for Healthcare: A Survey

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21
Medical Image Analysis
Adversarial Example
Machine Learning Method

An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14
DDoS Attack Detection
Network Threat Detection
Machine Learning Method