A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
Game of Trojans: A Submodular Byzantine Approach Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13 Algorithm DesignModel Performance EvaluationStrategic Game 2022.07.13 2025.05.28 Literature Database
RelaxLoss: Defending Membership Inference Attacks without Losing Utility Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12 Membership InferenceModel Performance EvaluationLoss Term 2022.07.12 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning) Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02 Hyperparameter OptimizationPoisoningModel Performance Evaluation 2022.05.02 2025.05.28 Literature Database
Mobile authentication of copy detection patterns Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18 Dataset GenerationData GenerationModel Performance Evaluation 2022.03.04 2025.05.28 Literature Database
Principles for Evaluation of AI/ML Model Performance and Robustness Authors: Olivia Brown, Andrew Curtis, Justin Goodwin | Published: 2021-07-06 Model Performance EvaluationRobustnessRobustness Evaluation 2021.07.06 2025.05.28 Literature Database
A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation Authors: Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael N. Johnstone, Wencheng Yang | Published: 2021-07-06 Privacy AnalysisModel Performance EvaluationMachine Learning Technology 2021.07.06 2025.05.28 Literature Database
Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02 Dataset evaluationModel Performance EvaluationAttack Evaluation 2021.07.02 2025.05.28 Literature Database
Extending Isolation Forest for Anomaly Detection in Big Data via K-Means Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27 ML-Based IDSData PreprocessingModel Performance Evaluation 2021.04.27 2025.05.28 Literature Database