Machine Learning Method

Online Malware Classification with System-Wide System Calls in Cloud IaaS

Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09
Malware Classification
Malware Detection Method
Machine Learning Method

Robust Machine Learning for Malware Detection over Time

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09
Malware Detection Method
Robustness Evaluation
Machine Learning Method

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01
Stability of Predictions
Performance Evaluation
Machine Learning Method

Lethal Dose Conjecture on Data Poisoning

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18
Robustness Evaluation
Classification Pattern Analysis
Machine Learning Method

On False Data Injection Attack against Building Automation Systems

Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25
Attack Evaluation
Attack Pattern Extraction
Machine Learning Method

Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption

Authors: Syed Imtiaz Ahamed, Vadlamani Ravi | Published: 2022-08-04
CKKS Scheme
Medical Image Analysis
Machine Learning Method

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06
Performance Evaluation
Methods for Dynamically Identifying New Classes
Machine Learning Method

A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection

Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09
Attack Method
Machine Learning Method
Temperature Conditions

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
Algorithm Design
Trojan Detection
Machine Learning Method