Algorithm

A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection

Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26
Algorithm
Energy Management
Performance Evaluation

Secure PAC Bayesian Regression via Real Shamir Secret Sharing

Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17
Algorithm
Privacy Risk Management
Linear Model

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks

Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26
Algorithm
Generalization Performance
Adversarial Learning

Differential Privacy in Personalized Pricing with Nonparametric Demand Models

Authors: Xi Chen, Sentao Miao, Yining Wang | Published: 2021-09-10
Algorithm
Data Privacy Assessment
Privacy Risk Management

Social Media Monitoring for IoT Cyber-Threats

Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09
Algorithm
Cybersecurity
Vulnerability Management

Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

Authors: Aryan Verma | Published: 2021-09-06
Algorithm
Model Protection Methods
Encryption Technology

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05
Algorithm
Distributed Learning
Machine Learning Method

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02
Algorithm
Adversarial Example
Machine Learning Method

Semantic-Preserving Adversarial Text Attacks

Authors: Xinghao Yang, Weifeng Liu, James Bailey, Dacheng Tao, Wei Liu | Published: 2021-08-23 | Updated: 2023-03-03
Algorithm
Text Generation Method
Adversarial Example