Training Method

Automated email Generation for Targeted Attacks using Natural Language

Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19
LSTM Model Performance Evaluation
Training Method
Phishing Detection

Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise

Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18
Training Method
Deep Reinforcement Learning
Adaptive Misuse Detection

Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin

Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26
Trade-off Analysis
Training Method
Adversarial Example

Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning

Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25
Training Method
Adversarial Example
Adversarial Transferability

Learning-Aided Physical Layer Authentication as an Intelligent Process

Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07
Training Method
Improvement of Learning
Machine Learning Method

A Study on Overfitting in Deep Reinforcement Learning

Authors: Chiyuan Zhang, Oriol Vinyals, Remi Munos, Samy Bengio | Published: 2018-04-18 | Updated: 2018-04-20
Training Method
Generalization Performance
Reinforcement Learning Optimization