Learning Type Inference for Enhanced Dataflow Analysis Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04 WatermarkingDynamic AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
Performance evaluation of Machine learning algorithms for Intrusion Detection System Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01 AlgorithmClassification Pattern AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
Evaluating Superhuman Models with Consistency Checks Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19 LLM Performance EvaluationAlgorithmEvaluation Method 2023.06.16 2025.05.28 Literature Database
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27 Model Design and AccuracyFeature Selection MethodEvaluation Method 2022.12.08 2025.05.28 Literature Database
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database
Ares: A System-Oriented Wargame Framework for Adversarial ML Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24 PoisoningReward Mechanism DesignEvaluation Method 2022.10.24 2025.05.28 Literature Database
The privacy issue of counterfactual explanations: explanation linkage attacks Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21 Counterfactual ExplanationPrivacy ViolationEvaluation Method 2022.10.21 2025.05.28 Literature Database
Verifiable Encodings for Secure Homomorphic Analytics Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04 Privacy TechniquePerformance Evaluation MetricsEvaluation Method 2022.07.28 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database
Firenze: Model Evaluation Using Weak Signals Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02 Data GenerationModel InterpretabilityEvaluation Method 2022.07.02 2025.05.28 Literature Database