EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
PhishOut: Effective Phishing Detection Using Selected Features Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi | Published: 2020-04-21 URL-based DetectionMulti-Class ClassificationMachine Learning 2020.04.21 2025.05.28 Literature Database
Headless Horseman: Adversarial Attacks on Transfer Learning Models Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20 PoisoningAdversarial Perturbation TechniquesMachine Learning 2020.04.20 2025.05.28 Literature Database
Local Differential Privacy based Federated Learning for Internet of Things Authors: Yang Zhao, Jun Zhao, Mengmeng Yang, Teng Wang, Ning Wang, Lingjuan Lyu, Dusit Niyato, Kwok-Yan Lam | Published: 2020-04-19 | Updated: 2020-12-22 Privacy Enhancing TechnologyOptimization MethodsMachine Learning 2020.04.19 2025.05.28 Literature Database
Data Poisoning Attacks on Federated Machine Learning Authors: Gan Sun, Yang Cong, Jiahua Dong, Qiang Wang, Ji Liu | Published: 2020-04-19 PoisoningAttack Scenario AnalysisMachine Learning 2020.04.19 2025.05.28 Literature Database
On the (Un)Reliability of Privacy Policies in Android Apps Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18 Privacy TechniqueDynamic Analysis MethodMachine Learning 2020.04.18 2025.05.28 Literature Database
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15 Multi-Class ClassificationMachine LearningAnomaly Detection Method 2020.04.15 2025.05.28 Literature Database
On the Resilience of Biometric Authentication Systems against Random Inputs Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24 PoisoningAdversarial attackMachine Learning 2020.01.13 2025.05.28 Literature Database
Membership Inference Attacks Against Object Detection Models Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28 Membership InferenceAdversarial attackMachine Learning 2020.01.12 2025.05.28 Literature Database
Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network Authors: Nathan Borggren, Hyoung-yoon Kim, Lihan Yao, Gary Koplik | Published: 2020-01-12 Data GenerationData Management SystemMachine Learning 2020.01.12 2025.05.28 Literature Database