Machine Learning Method

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04
Watermarking
Model Selection
Machine Learning Method

On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach

Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07
Privacy Enhancing Technology
Machine Learning Method
Regularization

Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis

Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03
Data Collection
Machine Learning Method
Feature Selection Method

MalIoT: Scalable and Real-time Malware Traffic Detection for IoT Networks

Authors: Ethan Weitkamp, Yusuke Satani, Adam Omundsen, Jingwen Wang, Peilong Li | Published: 2023-04-02
LSTM Model Performance Evaluation
Malware Detection
Machine Learning Method

Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows

Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22
Sensor Array Design
Machine Learning Method
State Estimation Method

Open SESAME: Fighting Botnets with Seed Reconstructions of Domain Generation Algorithms

Authors: Nils Weissgerber, Thorsten Jenke, Elmar Padilla, Lilli Bruckschen | Published: 2023-01-12
Data Collection
Unknown Attack Detection
Machine Learning Method

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11
Energy Management
Intrusion Detection System
Machine Learning Method

Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey

Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12
Model Design
Intrusion Detection System
Machine Learning Method

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13
Memory Management Method
Random Forest
Machine Learning Method

Classification Protocols with Minimal Disclosure

Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06
Convergence Guarantee
Multi-Party Computation
Machine Learning Method