A framework for the extraction of Deep Neural Networks by leveraging public data Authors: Soham Pal, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, Vinod Ganapathy | Published: 2019-05-22 Data CollectionMembership InferenceModel Performance Evaluation 2019.05.22 2025.05.28 Literature Database
Helping IT and OT Defenders Collaborate Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16 Control Model of CPSData CollectionMachine Learning Method 2019.04.16 2025.05.28 Literature Database
On Machine Learning DoS Attack Identification from Cloud Computing Telemetry Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11 DDoS AttackData CollectionMachine Learning Method 2019.04.11 2025.05.28 Literature Database
The future of statistical disclosure control Authors: Mark Elliot, Josep Domingo-Ferrer | Published: 2018-12-21 Data CollectionAttribute Disclosure RiskStatistical Methods 2018.12.21 2025.05.28 Literature Database
Machine Learning in Cyber-Security – Problems, Challenges and Data Sets Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22 Data CollectionMalware Detection MethodInformation Security 2018.12.19 2025.05.28 Literature Database
Training Set Camouflage Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13 Data CollectionApplication of Text ClassificationImprovement of Learning 2018.12.13 2025.05.28 Literature Database
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection Authors: Milad Salem, Shayan Taheri, Jiann Shiun Yuan | Published: 2018-12-11 Data CollectionMulti-Class ClassificationGenerative Adversarial Network 2018.12.11 2025.05.28 Literature Database
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09 Graph EmbeddingData CollectionMalware Detection Method 2018.12.10 2025.05.28 Literature Database
Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-12-05 | Updated: 2018-12-11 Data CollectionGeneralization PerformanceProbability distribution 2018.12.05 2025.05.28 Literature Database
Joint Service Pricing and Cooperative Relay Communication for Federated Learning Authors: Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, Ying-Chang Liang | Published: 2018-11-29 Data CollectionOptimization ProblemFederated Learning 2018.11.29 2025.05.28 Literature Database