Machine Learning in Cyber-Security – Problems, Challenges and Data Sets Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22 Data CollectionMalware Detection MethodInformation Security 2018.12.19 2025.05.28 Literature Database
Training Set Camouflage Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13 Data CollectionApplication of Text ClassificationImprovement of Learning 2018.12.13 2025.05.28 Literature Database
Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection Authors: Milad Salem, Shayan Taheri, Jiann Shiun Yuan | Published: 2018-12-11 Data CollectionMulti-Class ClassificationGenerative Adversarial Network 2018.12.11 2025.05.28 Literature Database
Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09 Graph EmbeddingData CollectionMalware Detection Method 2018.12.10 2025.05.28 Literature Database
Calibrate: Frequency Estimation and Heavy Hitter Identification with Local Differential Privacy via Incorporating Prior Knowledge Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-12-05 | Updated: 2018-12-11 Data CollectionGeneralization PerformanceProbability distribution 2018.12.05 2025.05.28 Literature Database
Joint Service Pricing and Cooperative Relay Communication for Federated Learning Authors: Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, Ying-Chang Liang | Published: 2018-11-29 Data CollectionOptimization ProblemFederated Learning 2018.11.29 2025.05.28 Literature Database
Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18 FR Detection MechanismData CollectionModel Performance Evaluation 2018.11.18 2025.05.28 Literature Database
Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13 Data CollectionModel Performance EvaluationFeature Importance Analysis 2018.11.13 2025.05.28 Literature Database
Structure and Content of the Visible Darknet Authors: Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros | Published: 2018-11-04 | Updated: 2018-11-07 Darknet AnalysisData CollectionLegal Compliance 2018.11.04 2025.05.28 Literature Database
Data mining for detecting Bitcoin Ponzi schemes Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01 Data CollectionModel evaluation methodsImbalanced Dataset 2018.03.01 2025.05.28 Literature Database