Machine Learning Method

Metadata-based Malware Detection on Android using Machine Learning

Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17
Dataset Generation
Malware Detection Method
Machine Learning Method

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15
Dataset Generation
Time Window Analysis
Machine Learning Method

Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03
Dataset Generation
Data Integrity Constraints
Machine Learning Method

Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data

Authors: Vivek Nair, Christian Rack, Wenbo Guo, Rui Wang, Shuixian Li, Brandon Huang, Atticus Cull, James F. O'Brien, Marc Latoschik, Louis Rosenberg, Dawn Song | Published: 2023-05-30 | Updated: 2023-06-10
Sampling Method
Privacy Protection Method
Machine Learning Method

Robust Lipschitz Bandits to Adversarial Corruptions

Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08
Reinforcement Learning
Adversarial attack
Machine Learning Method

Expressive Losses for Verified Robustness via Convex Combinations

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18
Parameter Tuning
Machine Learning Method
Deep Learning Method

On the Optimal Batch Size for Byzantine-Robust Distributed Learning

Authors: Yi-Rui Yang, Chang-Wei Shi, Wu-Jun Li | Published: 2023-05-23
Byzantine Consensus Mechanism
Convergence Property
Machine Learning Method

Quantum Machine Learning for Malware Classification

Authors: Grégoire Barrué, Tony Quertier | Published: 2023-05-09 | Updated: 2023-06-07
Parameter Tuning
Machine Learning Method
Quantum Neural Network

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Authors: Mahnoor Shahid | Published: 2023-04-27
Analysis of Detection Methods
Machine Learning Method
Deep Learning Method

When approximate design for fast homomorphic computation provides differential privacy guarantees

Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06
Watermarking
Privacy Enhancing Technology
Machine Learning Method