Feature Extraction Method

Detection and Analysis of Drive-by Downloads and Malicious Websites

Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09
Malware Detection
Information Security
Feature Extraction Method

Multi-Task Siamese Neural Network for Improving Replay Attack Detection

Authors: Patrick von Platen, Fei Tao, Gokhan Tur | Published: 2020-02-16
Training Method
Loss Function
Feature Extraction Method

An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners

Authors: Amir Andalib, Vahid Tabataba Vakili | Published: 2020-01-31 | Updated: 2020-12-29
Security Analysis
Machine Learning Technology
Feature Extraction Method

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

Authors: William Briguglio, Sherif Saad | Published: 2020-01-27
Robustness Improvement Method
Machine Learning Technology
Feature Extraction Method

Intelligent Methods for Accurately Detecting Phishing Websites

Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19
Information Security
Machine Learning Algorithm
Feature Extraction Method

DL-Droid: Deep learning based android malware detection using real devices

Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2019-11-22
Model Performance Evaluation
Deep Learning
Feature Extraction Method

Matrix Sketching for Secure Collaborative Machine Learning

Authors: Mengjiao Zhang, Shusen Wang | Published: 2019-09-24 | Updated: 2021-07-08
Data Collection
Machine Learning Technology
Feature Extraction Method

Fairness-Aware Process Mining

Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28
Data Collection
Feature Extraction Method
Measurement of Observational Fairness

Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors

Authors: Firat Coskun Dalgic, Ahmet Selman Bozkir, Murat Aydos | Published: 2019-05-19
Model Evaluation
Feature Extraction Method
Visual Techniques

STC Antispoofing Systems for the ASVspoof2019 Challenge

Authors: Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, Alexandr Kozlov | Published: 2019-04-11
Deep Learning Technology
Feature Extraction Method
Speech Synthesis Technology