How Does Data Augmentation Affect Privacy in Machine Learning? Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2020-07-21 | Updated: 2021-02-26 Data Extraction and AnalysisPrivacy AssessmentMembership Inference 2020.07.21 2025.05.28 Literature Database
Conditional Analysis for Key-Value Data with Local Differential Privacy Authors: Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, Tao Bai | Published: 2019-07-11 Data Extraction and AnalysisPrivacy ProtectionCondition Monitoring 2019.07.11 2025.05.28 Literature Database
On Designing Machine Learning Models for Malicious Network Traffic Classification Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad | Published: 2019-07-10 Data Extraction and AnalysisAttack DetectionMachine Learning Framework 2019.07.10 2025.05.28 Literature Database
Application Inference using Machine Learning based Side Channel Analysis Authors: Nikhil Chawla, Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay | Published: 2019-07-09 Automation of CybersecurityData Extraction and AnalysisMachine Learning Framework 2019.07.09 2025.05.28 Literature Database
Privacy-Preserving Classification with Secret Vector Machines Authors: Valentin Hartmann, Konark Modi, Josep M. Pujol, Robert West | Published: 2019-07-08 | Updated: 2020-08-19 Data Extraction and AnalysisPrivacy ProtectionFederated Learning 2019.07.08 2025.05.28 Literature Database
A Bayesian Hierarchical Model for Criminal Investigations Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05 Task DesignData Extraction and AnalysisInformation Gathering Methods 2019.07.03 2025.05.28 Literature Database
Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05 Automation of CybersecurityData Extraction and AnalysisInformation Gathering Methods 2019.07.03 2025.05.28 Literature Database
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts Authors: Xiaoyu Du, Mark Scanlon | Published: 2019-07-02 Data Extraction and AnalysisMachine Learning FrameworkResearch Methodology 2019.07.02 2025.05.28 Literature Database
System Misuse Detection via Informed Behavior Clustering and Modeling Authors: Linara Adilova, Livin Natious, Siming Chen, Olivier Thonnard, Michael Kamp | Published: 2019-07-01 Data Extraction and AnalysisMachine Learning FrameworkAnomaly Detection Method 2019.07.01 2025.05.28 Literature Database
Secure Summation via Subset Sums: A New Primitive for Privacy-Preserving Distributed Machine Learning Authors: Valentin Hartmann, Robert West | Published: 2019-06-27 | Updated: 2023-06-19 Data Extraction and AnalysisPrivacy ProtectionInitial Seed Generation 2019.06.27 2025.05.28 Literature Database