Attribute Privacy: Framework and Mechanisms Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11 Data GenerationCryptographyMachine Learning Technology 2020.09.08 2025.05.28 Literature Database
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16 Adversarial ExampleMachine Learning TechnologyEvaluation Method 2020.08.16 2025.05.28 Literature Database
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11 Machine Learning TechnologyDecision TreeEvaluation Method 2020.08.11 2025.05.28 Literature Database
Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18 Adversarial ExampleAdversarial attackMachine Learning Technology 2020.05.27 2025.05.28 Literature Database
SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27 AlgorithmMachine LearningMachine Learning Technology 2020.05.27 2025.05.28 Literature Database
Effects of Forward Error Correction on Communications Aware Evasion Attacks Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27 Adversarial attackMachine Learning TechnologyCommunication Loss 2020.05.27 2025.05.28 Literature Database
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17 Performance EvaluationPoisoningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
A Protection against the Extraction of Neural Network Models Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31 Adversarial attackMachine LearningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25 Machine LearningMachine Learning TechnologyThreat Model 2020.05.25 2025.05.28 Literature Database
Keyed Non-Parametric Hypothesis Tests Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25 PoisoningAdversarial attackMachine Learning Technology 2020.05.25 2025.05.28 Literature Database