Evaluation Method

Learning Type Inference for Enhanced Dataflow Analysis

Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04
Watermarking
Dynamic Analysis
Evaluation Method

Performance evaluation of Machine learning algorithms for Intrusion Detection System

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01
Algorithm
Classification Pattern Analysis
Evaluation Method

Evaluating Superhuman Models with Consistency Checks

Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19
LLM Performance Evaluation
Algorithm
Evaluation Method

A Dependable Hybrid Machine Learning Model for Network Intrusion Detection

Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27
Model Design and Accuracy
Feature Selection Method
Evaluation Method

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13
Security Assurance
Software Security
Evaluation Method

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24
Poisoning
Reward Mechanism Design
Evaluation Method

The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21
Counterfactual Explanation
Privacy Violation
Evaluation Method

Verifiable Encodings for Secure Homomorphic Analytics

Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04
Privacy Technique
Performance Evaluation Metrics
Evaluation Method

Ransomware Classification and Detection With Machine Learning Algorithms

Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02
Backdoor Attack
Dynamic Analysis
Evaluation Method

Firenze: Model Evaluation Using Weak Signals

Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02
Data Generation
Model Interpretability
Evaluation Method