Model Performance Evaluation

Tweaking Metasploit to Evade Encrypted C2 Traffic Detection

Authors: Gonçalo Xavier, Carlos Novo, Ricardo Morla | Published: 2022-09-02
Model Performance Evaluation
Adversarial Attack Methods
Communication Analysis

Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well?

Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02
Model Interpretability
Model Performance Evaluation
Experimental Validation

CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach

Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01
Model Performance Evaluation
Experimental Validation
Hierarchical Classification Methods

DiVa: An Accelerator for Differentially Private Machine Learning

Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26
Model Performance Evaluation
Efficiency Evaluation
Improvement of Learning

Generative Extraction of Audio Classifiers for Speaker Identification

Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26
Dataset Generation
Model Performance Evaluation
Speech Recognition Process

$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25
Out-of-Distribution Detection
Model Performance Evaluation
Hierarchical Classification Methods

Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25
Attack Methods against DFL
Membership Inference
Model Performance Evaluation

Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence

Authors: Markus Bayer, Tobias Frey, Christian Reuter | Published: 2022-07-22
Dataset Generation
Model Performance Evaluation
Expert Opinion Collection Process

Applying Machine Learning on RSRP-based Features for False Base Station Detection

Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah | Published: 2022-07-22
Model Performance Evaluation
Analysis of Detection Methods
Communication Analysis

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13
Model Performance Evaluation
Intrusion Detection System
Transparency and Verification