Data Preprocessing

Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection

Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20
ML-Based IDS
Data Preprocessing
Data Collection

ADASYN-Random Forest Based Intrusion Detection Model

Authors: Zhewei Chen, Wenwen Yu, Linyue Zhou | Published: 2021-05-10 | Updated: 2022-04-14
ML-Based IDS
Class Imbalance
Data Preprocessing

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06
Class Imbalance
Data Preprocessing
Vulnerability Analysis

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27
ML-Based IDS
Data Preprocessing
Model Performance Evaluation

Ponzi Scheme Detection in EthereumTransaction Network

Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17
Data Preprocessing
Blockchain Economics
Crime Detection

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30
Data Preprocessing
Classification of Malicious Actors
Machine Learning Method

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16
Data Preprocessing
Malware Detection Method
Model Evaluation

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16
Data Preprocessing
Performance Evaluation Method
Attack Chain Analysis

Active Learning for Network Intrusion Detection

Authors: Amir Ziai | Published: 2019-04-02
Active Learning
Data Preprocessing
Machine Learning Application

A Machine Learning Framework for Biometric Authentication using Electrocardiogram

Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo | Published: 2019-03-29 | Updated: 2019-08-05
Data Preprocessing
Signal Processing
Biometric Authentication Technology