Data Preprocessing

Ponzi Scheme Detection in EthereumTransaction Network

Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17
Data Preprocessing
Blockchain Economics
Crime Detection

Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features

Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30
Data Preprocessing
Classification of Malicious Actors
Machine Learning Method

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16
Data Preprocessing
Malware Detection Method
Model Evaluation

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16
Data Preprocessing
Performance Evaluation Method
Attack Chain Analysis

Active Learning for Network Intrusion Detection

Authors: Amir Ziai | Published: 2019-04-02
Active Learning
Data Preprocessing
Machine Learning Application

A Machine Learning Framework for Biometric Authentication using Electrocardiogram

Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo | Published: 2019-03-29 | Updated: 2019-08-05
Data Preprocessing
Signal Processing
Biometric Authentication Technology

A Unified Analytical Framework for Trustable Machine Learning and Automation Running with Blockchain

Authors: Tao Wang | Published: 2019-03-21
Data Origins and Evolution
Data Preprocessing
Blockchain Technology

A Graph-Based Machine Learning Approach for Bot Detection

Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba | Published: 2019-02-22
Graph Construction
Data Preprocessing
Bot Detection Method

Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks

Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23
Data Preprocessing
Performance Evaluation
Classification Pattern Analysis

Privacy Preserving Analytics on Distributed Medical Data

Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola | Published: 2018-06-18
Data Preprocessing
Privacy Protection Method
Differential Privacy