Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13 Backdoor AttackPoisoningMachine Learning 2021.06.16 2025.05.28 Literature Database
Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08 Reinforcement LearningOptimization MethodsMachine Learning 2021.06.08 2025.05.28 Literature Database
A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07 Risk Analysis MethodAdversarial Text PurificationMachine Learning 2021.03.03 2025.05.28 Literature Database
Malware Classification with Word Embedding Features Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03 Multi-Class ClassificationMembership InferenceMachine Learning 2021.03.03 2025.05.28 Literature Database
Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02 Backdoor AttackAttack MethodMachine Learning 2020.12.07 2025.05.28 Literature Database
Deep Learning Methods for Credit Card Fraud Detection Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar | Published: 2020-12-07 Machine LearningSelf-Learning MethodWeight Update Method 2020.12.07 2025.05.28 Literature Database
Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04 Machine LearningDeep LearningAnomaly Detection Algorithm 2020.12.04 2025.05.28 Literature Database
Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14 Machine LearningAnomaly Detection MethodCommunication Efficiency 2020.12.02 2025.05.28 Literature Database
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02 Attack MethodMachine LearningFinancial Intelligence 2020.10.19 2025.05.28 Literature Database
Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19 Device Identification MethodMachine LearningFeature Extraction Method 2020.10.16 2025.05.28 Literature Database