Performance Evaluation

Spam Detection Using BERT

Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07
Cyber Threat
Spam Detection
Performance Evaluation

Attack vs Benign Network Intrusion Traffic Classification

Authors: M. Andrecut | Published: 2022-05-15
Performance Evaluation
Attack Detection
evaluation metrics

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13
Performance Evaluation
Privacy Assessment
Model Selection

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method

A Comprehensive Benchmark Suite for Intel SGX

Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13
TEE Implementation
Data Generation
Performance Evaluation

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06
Performance Evaluation
Methods for Dynamically Identifying New Classes
Machine Learning Method

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10
Performance Evaluation
Prompt Injection
Attack Detection

On Generalisability of Machine Learning-based Network Intrusion Detection Systems

Authors: Siamak Layeghy, Marius Portmann | Published: 2022-05-09
Performance Evaluation
Intrusion Detection System
Attack Detection

Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection

Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08
Performance Evaluation
Intrusion Detection System
Attack Method