ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17 Adversarial ExampleAdversarial LearningMachine Learning Method 2019.04.17 2025.05.28 Literature Database
Helping IT and OT Defenders Collaborate Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16 Control Model of CPSData CollectionMachine Learning Method 2019.04.16 2025.05.28 Literature Database
On Machine Learning DoS Attack Identification from Cloud Computing Telemetry Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11 DDoS AttackData CollectionMachine Learning Method 2019.04.11 2025.05.28 Literature Database
Machine Learning in IoT Security: Current Solutions and Future Challenges Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14 Characteristics of IoT NetworksMachine Learning MethodDeep Learning 2019.03.14 2025.05.28 Literature Database
Peek-a-Boo: I see your smart home activities, even encrypted! Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13 IoT SecurityTraffic Characteristic AnalysisMachine Learning Method 2018.08.08 2025.05.28 Literature Database
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson | Published: 2018-08-08 | Updated: 2019-02-17 Adversarial LearningAdversarial attackMachine Learning Method 2018.08.08 2025.05.28 Literature Database
Learning-Aided Physical Layer Authentication as an Intelligent Process Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07 Training MethodImprovement of LearningMachine Learning Method 2018.08.07 2025.05.28 Literature Database
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03 API CallsDataset for Malware ClassificationMachine Learning Method 2018.08.03 2025.05.28 Literature Database
Robust Blind Deconvolution via Mirror Descent Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21 Robustness AnalysisConvergence PropertyMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.28 Literature Database