Evaluation Method

A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16
Adversarial Example
Machine Learning Technology
Evaluation Method

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11
Machine Learning Technology
Decision Tree
Evaluation Method

How to compare adversarial robustness of classifiers from a global perspective

Authors: Niklas Risse, Christina Göpfert, Jan Philip Göpfert | Published: 2020-04-22 | Updated: 2020-10-15
Poisoning
Robustness Analysis
Evaluation Method

Secure Evaluation of Quantized Neural Networks

Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01
Protocol Procedure
Model Architecture
Evaluation Method

Substra: a framework for privacy-preserving, traceable and collaborative Machine Learning

Authors: Mathieu N Galtier, Camille Marini | Published: 2019-10-25
Privacy Management
Cooperative System
Evaluation Method

A Note on Our Submission to Track 4 of iDASH 2019

Authors: Marcel Keller, Ke Sun | Published: 2019-10-24
Improvement of Learning
Evaluation Method
evaluation metrics

Side-Channel Aware Fuzzing

Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14
Future Research
Feature Engineering
Evaluation Method

Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$

Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24
Multi-Class Classification
Vulnerability Management
Evaluation Method

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25
Intrusion Detection System
Deep Learning Technology
Evaluation Method