Exploiting Multiple EEG Data Domains with Adversarial Learning Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16 Dataset evaluationMachine Learning MethodGenerative Adversarial Network 2022.04.16 2025.05.28 Literature Database
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16 Privacy Enhancing TechnologyCryptographic ProtocolMachine Learning Method 2022.04.16 2025.05.28 Literature Database
ML Supported Predictions for SAT Solvers Performance Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17 Model DesignPerformance Evaluation MetricsMachine Learning Method 2021.12.17 2025.05.28 Literature Database
Deep Bayesian Learning for Car Hacking Detection Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17 Machine Learning MethodDeep Learning MethodVulnerabilities in Autonomous Driving Technology 2021.12.17 2025.05.28 Literature Database
Model Stealing Attacks Against Inductive Graph Neural Networks Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15 Graph Representation LearningAdversarial TrainingMachine Learning Method 2021.12.15 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14 Link Prediction MethodPerformance Evaluation MetricsMachine Learning Method 2021.12.14 2025.05.28 Literature Database
Does Proprietary Software Still Offer Protection of Intellectual Property in the Age of Machine Learning? — A Case Study using Dual Energy CT Data Authors: Andreas Maier, Seung Hee Yang, Farhad Maleki, Nikesh Muthukrishnan, Reza Forghani | Published: 2021-12-06 Medical Monitoring SystemMachine Learning ApplicationMachine Learning Method 2021.12.06 2025.05.28 Literature Database
Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29 Machine Learning ApplicationMachine Learning MethodFeature Engineering 2021.10.29 2025.05.28 Literature Database
A Machine Learning Approach for DDoS Detection on IoT Devices Authors: Alireza Seifousadati, Saeid Ghasemshirazi, Mohammad Fathian | Published: 2021-10-28 DDoS AttackData PreprocessingMachine Learning Method 2021.10.28 2025.05.28 Literature Database