Feature Extraction Method

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method

Cyber-Attack Consequence Prediction

Authors: Prerit Datta, Natalie Lodinger, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-01 | Updated: 2020-12-02
Data Collection
Feature Extraction Method
Vulnerability detection

Towards a Universal Features Set for IoT Botnet Attacks Detection

Authors: Faisal Hussain, Syed Ghazanfar Abbas, Ubaid U. Fayyaz, Ghalib A. Shah, Abdullah Toqeer, Ahmad Ali | Published: 2020-12-01
DDoS Attack
ML-Based IDS
Feature Extraction Method

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19
Device Identification Method
Machine Learning
Feature Extraction Method

Rotation-Equivariant Neural Networks for Privacy Protection

Authors: Hao Zhang, Yiting Chen, Haotian Ma, Xu Cheng, Qihan Ren, Liyao Xiang, Jie Shi, Quanshi Zhang | Published: 2020-06-21
Machine Learning Algorithm
Feature Extraction Method
Watermarking Technology

Adversarial Feature Selection against Evasion Attacks

Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25
Poisoning
Adversarial attack
Feature Extraction Method

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Feature Extraction Method

TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations

Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25
Data Protection Method
Privacy Assessment
Feature Extraction Method

PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fields and Masking

Authors: Chong Xiang, Arjun Nitin Bhagoji, Vikash Sehwag, Prateek Mittal | Published: 2020-05-17 | Updated: 2021-03-31
Robustness Analysis
Adversarial attack
Feature Extraction Method

A Review of Computer Vision Methods in Network Security

Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne | Published: 2020-05-07
Malware Classification
Analysis of Detection Methods
Feature Extraction Method