Case-based reasoning for rare events prediction on strategic sites Authors: Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier | Published: 2022-02-10 Data CollectionData Selection StrategyRisk Prediction and Mitigation 2022.02.10 2025.05.28 Literature Database
Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça | Published: 2021-12-29 Data CollectionMachine Learning TechnologyEvaluation Method 2021.12.29 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database
Machine Learning Models Disclosure from Trusted Research Environments (TRE), Challenges and Opportunities Authors: Esma Mansouri-Benssassi, Simon Rogers, Jim Smith, Felix Ritchie, Emily Jefferson | Published: 2021-11-10 | Updated: 2022-08-20 Data CollectionPrivacy Risk ManagementPrivacy Protection in Machine Learning 2021.11.10 2025.05.28 Literature Database
Color Teams for Machine Learning Development Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20 Automation of CybersecurityData CollectionMachine Learning Framework 2021.10.20 2025.05.28 Literature Database
Teacher Model Fingerprinting Attacks Against Transfer Learning Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23 WatermarkingData CollectionPrompt Injection 2021.06.23 2025.05.28 Literature Database
Outlier Detection and Spatial Analysis Algorithms Authors: Jacob John | Published: 2021-06-20 Data PreprocessingData CollectionData-Driven Clustering 2021.06.20 2025.05.28 Literature Database
Longitudinal Compliance Analysis of Android Applications with Privacy Policies Authors: Saad Sajid Hashmi, Nazar Waheed, Gioacchino Tangari, Muhammad Ikram, Stephen Smith | Published: 2021-06-18 | Updated: 2021-07-28 Data CollectionData LeakagePrivacy Enhancing Technology 2021.06.18 2025.05.28 Literature Database
Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm Authors: Fan Huang | Published: 2021-05-28 Data PreprocessingData CollectionUser Behavior Analysis 2021.05.28 2025.05.28 Literature Database
The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25 Cyber AttackCyber ThreatData Collection 2021.05.25 2025.05.28 Literature Database