Machine Learning Technology

Attribute Privacy: Framework and Mechanisms

Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11
Data Generation
Cryptography
Machine Learning Technology

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16
Adversarial Example
Machine Learning Technology
Evaluation Method

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11
Machine Learning Technology
Decision Tree
Evaluation Method

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18
Adversarial Example
Adversarial attack
Machine Learning Technology

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27
Algorithm
Machine Learning
Machine Learning Technology

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27
Adversarial attack
Machine Learning Technology
Communication Loss

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology

A Protection against the Extraction of Neural Network Models

Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31
Adversarial attack
Machine Learning
Machine Learning Technology

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Threat Model

Keyed Non-Parametric Hypothesis Tests

Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25
Poisoning
Adversarial attack
Machine Learning Technology