TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28 Privacy ProtectionEncryption TechnologyMachine Learning Technology 2021.04.07 2025.05.28 Literature Database
CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks Authors: Iqbal H. Sarker | Published: 2021-03-28 Multi-Class ClassificationModel Selection MethodMachine Learning Technology 2021.03.28 2025.05.28 Literature Database
Differentially Private ADMM Algorithms for Machine Learning Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31 DP-SGDMachine Learning Technologyevaluation metrics 2020.10.31 2025.05.28 Literature Database
DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04 DNS Covert ChannelMachine Learning TechnologyAnomaly Detection Method 2020.10.04 2025.05.28 Literature Database
Federated Model Distillation with Noise-Free Differential Privacy Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21 Performance EvaluationMachine Learning TechnologyEvaluation Method 2020.09.11 2025.05.28 Literature Database
Attribute Privacy: Framework and Mechanisms Authors: Wanrong Zhang, Olga Ohrimenko, Rachel Cummings | Published: 2020-09-08 | Updated: 2021-05-11 Data GenerationCryptographyMachine Learning Technology 2020.09.08 2025.05.28 Literature Database
A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16 Adversarial ExampleMachine Learning TechnologyEvaluation Method 2020.08.16 2025.05.28 Literature Database
Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11 Machine Learning TechnologyDecision TreeEvaluation Method 2020.08.11 2025.05.28 Literature Database
Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18 Adversarial ExampleAdversarial attackMachine Learning Technology 2020.05.27 2025.05.28 Literature Database
SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27 AlgorithmMachine LearningMachine Learning Technology 2020.05.27 2025.05.28 Literature Database