Machine Learning

A Review of Federated Learning in Energy Systems

Authors: Xu Cheng, Chendan Li, Xiufeng Liu | Published: 2022-08-20
Privacy Violation
Efficiency of Distributed Learning
Machine Learning

Challenges and Complexities in Machine Learning based Credit Card Fraud Detection

Authors: Gayan K. Kulatilleke | Published: 2022-08-20
Data Origins and Evolution
Fraudulent Transaction
Machine Learning

A New Implementation of Federated Learning for Privacy and Security Enhancement

Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03
Byzantine Consensus Mechanism
Privacy Leakage
Machine Learning

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17
Privacy Leakage
Membership Inference
Machine Learning

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27
Dataset Generation
Performance Evaluation
Machine Learning

Membership Inference Attacks via Adversarial Examples

Authors: Hamid Jalalzai, Elie Kadoche, Rémi Leluc, Vincent Plassier | Published: 2022-07-27 | Updated: 2022-11-23
Membership Inference
Attack Method
Machine Learning

Fine-grained Private Knowledge Distillation

Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06
Privacy Technique
Adversarial Example
Machine Learning

Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data

Authors: John Lim, Jan-Michael Frahm, Fabian Monrose | Published: 2022-04-05
Dataset Generation
Privacy Enhancing Technology
Machine Learning

Towards Explainable Meta-Learning for DDoS Detection

Authors: Qianru Zhou, Rongzhen Li, Lei Xu, Arumugam Nallanathan, Jian Yang, Anmin Fu | Published: 2022-04-05 | Updated: 2022-08-16
DDoS Attack
ML-Based IDS
Machine Learning

Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04
Dynamic Analysis Method
Machine Learning
Image Feature Extraction