Algorithm Selection Framework for Cyber Attack Detection Authors: Marc Chalé, Nathaniel D. Bastian, Jeffery Weir | Published: 2020-05-28 AlgorithmNetwork Threat DetectionFeature Selection Method 2020.05.28 2025.05.28 Literature Database
SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27 AlgorithmMachine LearningMachine Learning Technology 2020.05.27 2025.05.28 Literature Database
Identifying Vulnerabilities of Industrial Control Systems using Evolutionary Multiobjective Optimisation Authors: Nilufer Tuptuk, Stephen Hailes | Published: 2020-05-27 AlgorithmAttack EvaluationOptimization Methods 2020.05.27 2025.05.28 Literature Database
An Adversarial Approach for Explaining the Predictions of Deep Neural Networks Authors: Arash Rahnama, Andrew Tseng | Published: 2020-05-20 | Updated: 2020-09-28 AlgorithmPoisoningStatistical Analysis 2020.05.20 2025.05.28 Literature Database
Graph Structure Learning for Robust Graph Neural Networks Authors: Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, Jiliang Tang | Published: 2020-05-20 | Updated: 2020-06-27 AlgorithmGraph Representation LearningOptimization Strategy 2020.05.20 2025.05.28 Literature Database
Continuous LWE Authors: Joan Bruna, Oded Regev, Min Jae Song, Yi Tang | Published: 2020-05-19 | Updated: 2020-10-24 AlgorithmComputational ProblemQuantum Information and Quantum Computing 2020.05.19 2025.05.28 Literature Database
Enhancing Certified Robustness via Smoothed Weighted Ensembling Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23 AlgorithmGeneralization PerformanceResearch Methodology 2020.05.19 2025.05.28 Literature Database
A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database
Universal Adversarial Perturbations: A Survey Authors: Ashutosh Chaubey, Nikhil Agrawal, Kavya Barnwal, Keerat K. Guliani, Pramod Mehta | Published: 2020-05-16 AlgorithmLoss FunctionAdversarial Example 2020.05.16 2025.05.28 Literature Database
Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data Authors: Deepesh Data, Suhas Diggavi | Published: 2020-05-16 AlgorithmLoss FunctionMachine Learning Algorithm 2020.05.16 2025.05.28 Literature Database