Feature Engineering

Beta-CoRM: A Bayesian Approach for $n$-gram Profiles Analysis

Authors: José A. Perusquía, Jim E. Griffin, Cristiano Villa | Published: 2020-11-23 | Updated: 2024-09-02
Model Performance Evaluation
Feature Engineering
Generative Model Characteristics

Adversarial Examples in Constrained Domains

Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09
Adversarial Example
Adversarial attack
Feature Engineering

Ensemble-based Feature Selection and Classification Model for DNS Typo-squatting Detection

Authors: Abdallah Moubayed, Emad Aqeeli, Abdallah Shami | Published: 2020-06-08
Attack Method
Feature Engineering
Vulnerability detection

NetML: A Challenge for Network Traffic Analytics

Authors: Onur Barut, Yan Luo, Tong Zhang, Weigang Li, Peilong Li | Published: 2020-04-25
TLS Feature Analysis
Malware Classification
Feature Engineering

Digit Recognition From Wrist Movements and Security Concerns with Smart Wrist Wearable IOT Devices

Authors: Lambert T. Leong, Sean Wiere | Published: 2020-04-22
Security Assurance
Role of Machine Learning
Feature Engineering

Cyber Attack Detection thanks to Machine Learning Algorithms

Authors: Antoine Delplace, Sheryl Hermoso, Kristofer Anandita | Published: 2020-01-17
Machine Learning Method
Feature Engineering
Statistical Methods

The Performance of Machine and Deep Learning Classifiers in Detecting Zero-Day Vulnerabilities

Authors: Faranak Abri, Sima Siami-Namini, Mahdi Adl Khanghah, Fahimeh Mirza Soltani, Akbar Siami Namin | Published: 2019-11-21
Hyperparameter Optimization
Model Performance Evaluation
Feature Engineering

Sieving Fake News From Genuine: A Synopsis

Authors: Shahid Alam, Abdulaziz Ravshanbekov | Published: 2019-11-19
Spam Detection
Role of Machine Learning
Feature Engineering

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
Model Performance Evaluation
Adversarial Attack Methods
Feature Engineering

Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences

Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15
Data Collection
Efficiency Evaluation
Feature Engineering