Machine Learning Method

Analysis and prevention of AI-based phishing email attacks

Authors: Chibuike Samuel Eze, Lior Shamir | Published: 2024-05-08
Dataset Generation
Phishing Detection
Machine Learning Method

A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation

Authors: Phoebe Jing, Yijing Gao, Xianlong Zeng | Published: 2024-04-23
Watermarking
Data Privacy Assessment
Machine Learning Method

A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks

Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02
Watermarking
Model Performance Evaluation
Machine Learning Method

Multistatic-Radar RCS-Signature Recognition of Aerial Vehicles: A Bayesian Fusion Approach

Authors: Michael Potter, Murat Akcakaya, Marius Necsoiu, Gunar Schirner, Deniz Erdogmus, Tales Imbiriba | Published: 2024-02-28 | Updated: 2024-08-16
Training Data Generation
Bayesian Classification
Machine Learning Method

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai | Published: 2024-02-26 | Updated: 2024-05-10
SQL Injection Attack Detection
Phishing Detection
Machine Learning Method

opML: Optimistic Machine Learning on Blockchain

Authors: KD Conway, Cathie So, Xiaohang Yu, Kartin Wong | Published: 2024-01-31 | Updated: 2024-02-05
Watermarking
Blockchain Technology
Machine Learning Method

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
Cybersecurity
Ransomware Assessment
Machine Learning Method

User authentication system based on human exhaled breath physics

Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02
User Authentication System
Time-Related Features
Machine Learning Method

Darknet Traffic Analysis A Systematic Literature Review

Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27
Darknet Traffic Analysis
Machine Learning Method
Communication Analysis

Privacy-Preserving Algorithmic Recourse

Authors: Sikha Pentyala, Shubham Sharma, Sanjay Kariyappa, Freddy Lecue, Daniele Magazzeni | Published: 2023-11-23
Privacy Protection
Machine Learning Method
Explainability