Machine Learning

EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks

Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21
Machine Learning
Deep Learning-Based IDS
Defense Method

PhishOut: Effective Phishing Detection Using Selected Features

Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi | Published: 2020-04-21
URL-based Detection
Multi-Class Classification
Machine Learning

Headless Horseman: Adversarial Attacks on Transfer Learning Models

Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20
Poisoning
Adversarial Perturbation Techniques
Machine Learning

Local Differential Privacy based Federated Learning for Internet of Things

Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22
Privacy Enhancing Technology
Optimization Methods
Machine Learning

Data Poisoning Attacks on Federated Machine Learning

Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19
Poisoning
Attack Scenario Analysis
Machine Learning

On the (Un)Reliability of Privacy Policies in Android Apps

Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18
Privacy Technique
Dynamic Analysis Method
Machine Learning

Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms

Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15
Multi-Class Classification
Machine Learning
Anomaly Detection Method

On the Resilience of Biometric Authentication Systems against Random Inputs

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24
Poisoning
Adversarial attack
Machine Learning

Membership Inference Attacks Against Object Detection Models

Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28
Membership Inference
Adversarial attack
Machine Learning

Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network

Authors: Nathan Borggren, Hyoung-yoon Kim, Lihan Yao, Gary Koplik | Published: 2020-01-12
Data Generation
Data Management System
Machine Learning