Dataset evaluation

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
Watermarking
Dataset evaluation
Training Data Extraction Method

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
Dataset evaluation
Intrusion Detection System
Taxonomy of Attacks

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21
Dataset evaluation
Attack Detection
Role of Machine Learning

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10
Dataset evaluation
Taxonomy of Attacks
Role of Machine Learning

Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic

Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22
Dataset evaluation
Machine Learning Application
Anomaly Detection Method

Certified Distributional Robustness on Smoothed Classifiers

Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30
Dataset evaluation
Robustness Improvement Method
Adversarial Example

Multi-Dimensional Randomized Response

Authors: Josep Domingo-Ferrer, Jordi Soria-Comas | Published: 2020-10-21 | Updated: 2020-12-19
Dataset evaluation
Privacy Assurance
Multidimensional Data Analysis

Image Obfuscation for Privacy-Preserving Machine Learning

Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20
Dataset evaluation
Data Protection Method
Membership Inference

Dos and Don’ts of Machine Learning in Computer Security

Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30
Spurious Correlation
Dataset evaluation
Bias

BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models

Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08
Dataset evaluation
Backdoor Attack
Machine Learning