Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07 Privacy Enhancing TechnologyMachine Learning MethodRegularization 2023.04.03 2025.05.28 Literature Database
Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03 Data CollectionMachine Learning MethodFeature Selection Method 2023.04.03 2025.05.28 Literature Database
MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02 LSTM Model Performance EvaluationMalware DetectionMachine Learning Method 2023.04.02 2025.05.28 Literature Database
Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22 Sensor Array DesignMachine Learning MethodState Estimation Method 2023.03.22 2025.05.28 Literature Database
Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12 Data CollectionUnknown Attack DetectionMachine Learning Method 2023.01.12 2025.05.28 Literature Database
Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11 Energy ManagementIntrusion Detection SystemMachine Learning Method 2022.10.11 2025.05.28 Literature Database
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 Model DesignIntrusion Detection SystemMachine Learning Method 2022.09.12 2025.05.28 Literature Database
SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13 Memory Management MethodRandom ForestMachine Learning Method 2022.09.12 2025.05.28 Literature Database
Classification Protocols with Minimal Disclosure Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06 Convergence GuaranteeMulti-Party ComputationMachine Learning Method 2022.09.06 2025.05.28 Literature Database