Model Performance Evaluation

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14
Algorithm Design
Data Selection Strategy
Model Performance Evaluation

Game of Trojans: A Submodular Byzantine Approach

Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13
Algorithm Design
Model Performance Evaluation
Strategic Game

RelaxLoss: Defending Membership Inference Attacks without Losing Utility

Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12
Membership Inference
Model Performance Evaluation
Loss Term

Federated Unlearning: How to Efficiently Erase a Client in FL?

Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20
Client Data Deletion
Backdoor Attack
Model Performance Evaluation

Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning)

Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02
Hyperparameter Optimization
Poisoning
Model Performance Evaluation

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18
Dataset Generation
Data Generation
Model Performance Evaluation

Principles for Evaluation of AI/ML Model Performance and Robustness

Authors: Olivia Brown, Andrew Curtis, Justin Goodwin | Published: 2021-07-06
Model Performance Evaluation
Robustness
Robustness Evaluation

A Low-Cost Machine Learning Based Network Intrusion Detection System with Data Privacy Preservation

Authors: Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael N. Johnstone, Wencheng Yang | Published: 2021-07-06
Privacy Analysis
Model Performance Evaluation
Machine Learning Technology

Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02
Dataset evaluation
Model Performance Evaluation
Attack Evaluation

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27
ML-Based IDS
Data Preprocessing
Model Performance Evaluation