Feature Importance Analysis

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23
Poisoning
Machine Learning Method
Feature Importance Analysis

Tight Second-Order Certificates for Randomized Smoothing

Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15
Optimization Methods
Feature Importance Analysis
Certificate Ratio Analysis

Correlated Differential Privacy: Feature Selection in Machine Learning

Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07
Data Protection Method
Data Selection Strategy
Feature Importance Analysis

Feature importance in mobile malware detection

Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28
Dataset Analysis
Malware Detection Method
Feature Importance Analysis

Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain

Authors: Ihai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2020-07-05 | Updated: 2021-03-13
Adversarial Example
Adversarial Learning
Feature Importance Analysis

Smoothed Geometry for Robust Attribution

Authors: Zifan Wang, Haofan Wang, Shakul Ramkumar, Matt Fredrikson, Piotr Mardziel, Anupam Datta | Published: 2020-06-11 | Updated: 2020-10-22
Attack Type
Feature Importance Analysis
Interpretation Method

Evaluations and Methods for Explanation through Robustness Analysis

Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08
Future Research
Feature Importance Analysis
Interpretation Method

Neuron Shapley: Discovering the Responsible Neurons

Authors: Amirata Ghorbani, James Zou | Published: 2020-02-23 | Updated: 2020-11-13
Performance Evaluation
Feature Importance Analysis
Vulnerability Prediction

Recovering Localized Adversarial Attacks

Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21
Poisoning
Adversarial Learning
Feature Importance Analysis

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05
Cyber Threat
Model Ensemble
Feature Importance Analysis