IntelliAV: Building an Effective On-Device Android Malware Detector Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04 Risk AssessmentMachine Learning MethodFeature Extraction 2018.02.04 2025.05.28 Literature Database
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30 Reinforcement Learning MethodAdversarial attackMachine Learning Method 2018.01.26 2025.05.28 Literature Database
Secure $k$-ish Nearest Neighbors Classifier Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30 Secure Arithmetic ComputationMachine Learning MethodWatermarking Technology 2018.01.22 2025.05.28 Literature Database
Fusion of ANN and SVM Classifiers for Network Attack Detection Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10 ML-Based IDSData PreprocessingMachine Learning Method 2018.01.09 2025.05.28 Literature Database
Evaluation of Machine Learning Algorithms for Intrusion Detection System Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08 ML-Based IDSData PreprocessingMachine Learning Method 2018.01.08 2025.05.28 Literature Database
HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08 Multi-Domain Data AnalysisDynamic Analysis MethodMachine Learning Method 2018.01.08 2025.05.28 Literature Database
A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05 User Authentication SystemMachine Learning MethodFacial Recognition Technology 2018.01.05 2025.05.28 Literature Database
A Machine Learning Based Intrusion Detection System for Software Defined 5G Network Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10 Model Performance EvaluationRandom ForestMachine Learning Method 2017.07.10 2025.05.28 Literature Database