Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20 ML-Based IDSData PreprocessingData Collection 2021.05.20 2025.05.28 Literature Database
ADASYN-Random Forest Based Intrusion Detection Model Authors: Zhewei Chen, Wenwen Yu, Linyue Zhou | Published: 2021-05-10 | Updated: 2022-04-14 ML-Based IDSClass ImbalanceData Preprocessing 2021.05.10 2025.05.28 Literature Database
Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06 Class ImbalanceData PreprocessingVulnerability Analysis 2021.05.06 2025.05.28 Literature Database
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27 ML-Based IDSData PreprocessingModel Performance Evaluation 2021.04.27 2025.05.28 Literature Database
Ponzi Scheme Detection in EthereumTransaction Network Authors: Shanqing Yu, Jie Jin, Yunyi Xie, Jie Shen, Qi Xuan | Published: 2021-04-17 Data PreprocessingBlockchain EconomicsCrime Detection 2021.04.17 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 Data PreprocessingClassification of Malicious ActorsMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16 Data PreprocessingMalware Detection MethodModel Evaluation 2019.05.16 2025.05.28 Literature Database
Fooling Computer Vision into Inferring the Wrong Body Mass Index Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16 Data PreprocessingPerformance Evaluation MethodAttack Chain Analysis 2019.05.16 2025.05.28 Literature Database
Active Learning for Network Intrusion Detection Authors: Amir Ziai | Published: 2019-04-02 Active LearningData PreprocessingMachine Learning Application 2019.04.02 2025.05.28 Literature Database
A Machine Learning Framework for Biometric Authentication using Electrocardiogram Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo | Published: 2019-03-29 | Updated: 2019-08-05 Data PreprocessingSignal ProcessingBiometric Authentication Technology 2019.03.29 2025.05.28 Literature Database