Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning Authors: Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, Jie Tang | Published: 2021-11-08 Dataset evaluationPoisoningGeneralization Performance 2021.11.08 2025.05.13 Literature Database
A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann | Published: 2021-11-04 Dataset evaluationPrivacy ProtectionFederated Learning 2021.11.04 2025.05.13 Literature Database
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02 Dataset evaluationMachine Learning AlgorithmAutomated Intrusion Detection System 2021.11.02 2025.05.13 Literature Database
Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02 Dataset evaluationModel Performance EvaluationAttack Evaluation 2021.07.02 2025.05.13 Literature Database
How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23 Dataset evaluationModel Design and AccuracyTaxonomy of Attacks 2021.06.14 2025.05.13 Literature Database
IoTDevID: A Behavior-Based Device Identification Method for the IoT Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19 Dataset evaluationData CollectionModel Performance Evaluation 2021.02.17 2025.05.13 Literature Database
Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14 Dataset evaluationModel Performance EvaluationAdversarial Example 2021.02.10 2025.05.13 Literature Database
$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22 Dataset evaluationData Protection MethodModel Performance Evaluation 2021.02.09 2025.05.13 Literature Database
Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18 WatermarkingDataset evaluationTraining Data Extraction Method 2020.12.18 2025.05.13 Literature Database
Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17 Dataset evaluationIntrusion Detection SystemTaxonomy of Attacks 2020.12.17 2025.05.13 Literature Database