Dataset evaluation

Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning

Authors: Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, Jie Tang | Published: 2021-11-08
Dataset evaluation
Poisoning
Generalization Performance

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann | Published: 2021-11-04
Dataset evaluation
Privacy Protection
Federated Learning

A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks

Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02
Dataset evaluation
Machine Learning Algorithm
Automated Intrusion Detection System

Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02
Dataset evaluation
Model Performance Evaluation
Attack Evaluation

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23
Dataset evaluation
Model Design and Accuracy
Taxonomy of Attacks

IoTDevID: A Behavior-Based Device Identification Method for the IoT

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19
Dataset evaluation
Data Collection
Model Performance Evaluation

Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons

Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14
Dataset evaluation
Model Performance Evaluation
Adversarial Example

$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers

Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22
Dataset evaluation
Data Protection Method
Model Performance Evaluation

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
Watermarking
Dataset evaluation
Training Data Extraction Method

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks