Machine Learning Technology

TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption

Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28
Privacy Protection
Encryption Technology
Machine Learning Technology

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Authors: Iqbal H. Sarker | Published: 2021-03-28
Multi-Class Classification
Model Selection Method
Machine Learning Technology

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31
DP-SGD
Machine Learning Technology
evaluation metrics

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04
DNS Covert Channel
Machine Learning Technology
Anomaly Detection Method

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method

Attribute Privacy: Framework and Mechanisms

Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11
Data Generation
Cryptography
Machine Learning Technology

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16
Adversarial Example
Machine Learning Technology
Evaluation Method

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11
Machine Learning Technology
Decision Tree
Evaluation Method

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18
Adversarial Example
Adversarial attack
Machine Learning Technology

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27
Algorithm
Machine Learning
Machine Learning Technology