Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 FDI Attack Detection MethodsMachine Learning Methodevaluation metrics 2018.03.18 2025.05.28 Literature Database
Adversarial Logit Pairing Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16 Certified RobustnessAdversarial LearningMachine Learning Method 2018.03.16 2025.05.28 Literature Database
Chiron: Privacy-preserving Machine Learning as a Service Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15 Distributed LearningDifferential PrivacyMachine Learning Method 2018.03.15 2025.05.28 Literature Database
Machine learning-assisted virtual patching of web applications Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14 Website VulnerabilityAttack Scenario AnalysisMachine Learning Method 2018.03.14 2025.05.28 Literature Database
Asynchronous Byzantine Machine Learning (the case of SGD) Authors: Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, Mahsa Taziki | Published: 2018-02-22 | Updated: 2018-07-09 Methods to Address Dynamic Byzantine BehaviorMachine Learning MethodAdaptive Learning Rate 2018.02.22 2025.05.28 Literature Database
The Hidden Vulnerability of Distributed Learning in Byzantium Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17 PoisoningAdversarial attackMachine Learning Method 2018.02.22 2025.05.28 Literature Database
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Siwei Li, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-02-19 Certified RobustnessAdversarial attackMachine Learning Method 2018.02.19 2025.05.28 Literature Database
Actions Speak Louder Than Goals: Valuing Player Actions in Soccer Authors: Tom Decroos, Lotte Bransen, Jan Van Haaren, Jesse Davis | Published: 2018-02-18 | Updated: 2019-07-10 Privacy ManagementUser Behavior AnalysisMachine Learning Method 2018.02.18 2025.05.28 Literature Database
Generative Models for Spear Phishing Posts on Social Media Authors: John Seymour, Philip Tully | Published: 2018-02-14 Data CollectionUser Activity AnalysisMachine Learning Method 2018.02.14 2025.05.28 Literature Database
Distributed One-class Learning Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro | Published: 2018-02-10 Privacy Protection MechanismAdversarial LearningMachine Learning Method 2018.02.10 2025.05.28 Literature Database