A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26 AlgorithmEnergy ManagementPerformance Evaluation 2021.09.23 2025.05.28 Literature Database
Secure PAC Bayesian Regression via Real Shamir Secret Sharing Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17 AlgorithmPrivacy Risk ManagementLinear Model 2021.09.23 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26 AlgorithmGeneralization PerformanceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
Differential Privacy in Personalized Pricing with Nonparametric Demand Models Authors: Xi Chen, Sentao Miao, Yining Wang | Published: 2021-09-10 AlgorithmData Privacy AssessmentPrivacy Risk Management 2021.09.10 2025.05.28 Literature Database
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 AlgorithmCybersecurityVulnerability Management 2021.09.09 2025.05.28 Literature Database
Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications Authors: Aryan Verma | Published: 2021-09-06 AlgorithmModel Protection MethodsEncryption Technology 2021.09.06 2025.05.28 Literature Database
Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05 AlgorithmDistributed LearningMachine Learning Method 2021.09.05 2025.05.28 Literature Database
EG-Booster: Explanation-Guided Booster of ML Evasion Attacks Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02 AlgorithmAdversarial ExampleMachine Learning Method 2021.08.31 2025.05.28 Literature Database
Semantic-Preserving Adversarial Text Attacks Authors: Xinghao Yang, Weifeng Liu, James Bailey, Dacheng Tao, Wei Liu | Published: 2021-08-23 | Updated: 2023-03-03 AlgorithmText Generation MethodAdversarial Example 2021.08.23 2025.05.28 Literature Database