Machine Learning

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
Backdoor Attack
Poisoning
Machine Learning

Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization

Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08
Reinforcement Learning
Optimization Methods
Machine Learning

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07
Risk Analysis Method
Adversarial Text Purification
Machine Learning

Malware Classification with Word Embedding Features

Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03
Multi-Class Classification
Membership Inference
Machine Learning

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02
Backdoor Attack
Attack Method
Machine Learning

Deep Learning Methods for Credit Card Fraud Detection

Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar | Published: 2020-12-07
Machine Learning
Self-Learning Method
Weight Update Method

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04
Machine Learning
Deep Learning
Anomaly Detection Algorithm

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14
Machine Learning
Anomaly Detection Method
Communication Efficiency

Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders

Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02
Attack Method
Machine Learning
Financial Intelligence

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19
Device Identification Method
Machine Learning
Feature Extraction Method