Cryptomining Makes Noise: a Machine Learning Approach for Cryptojacking Detection Authors: Maurantonio Caprolu, Simone Raponi, Gabriele Oligeri, Roberto Di Pietro | Published: 2019-10-21 | Updated: 2020-01-28 Network Traffic AnalysisPerformance EvaluationMachine Learning Method 2019.10.21 2025.05.28 Literature Database
Machine Learning based IoT Edge Node Security Attack and Countermeasures Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam | Published: 2019-09-17 Cyber AttackSecurity AnalysisMachine Learning Method 2019.09.17 2025.05.28 Literature Database
Network entity characterization and attack prediction Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17 Data Selection StrategyAttack DetectionMachine Learning Method 2019.09.17 2025.05.28 Literature Database
Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16 Secure Communication ChannelAttack DetectionMachine Learning Method 2019.09.16 2025.05.28 Literature Database
A Convolutional Transformation Network for Malware Classification Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16 Security AnalysisClassification of Malicious ActorsMachine Learning Method 2019.09.16 2025.05.28 Literature Database
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16 BlockchainMachine Learning MethodComputational Problem 2019.09.16 2025.05.28 Literature Database
Structural Robustness for Deep Learning Architectures Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11 Attack MethodMachine Learning ApplicationMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Sparse and Imperceivable Adversarial Attacks Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11 PoisoningAttack MethodMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Identifying and Resisting Adversarial Videos Using Temporal Consistency Authors: Xiaojun Jia, Xingxing Wei, Xiaochun Cao | Published: 2019-09-11 Adversarial Spectrum Attack DetectionMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Decentralized & Collaborative AI on Blockchain Authors: Justin D. Harris, Bo Waggoner | Published: 2019-07-16 Privacy IssuesBlockchain EconomicsMachine Learning Method 2019.07.16 2025.05.28 Literature Database