A Primer on Bayesian Neural Networks: Review and Debates Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28 AlgorithmSampling MethodModel Selection 2023.09.28 2025.05.28 Literature Database
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12 Privacy Protection MethodModel SelectionCondition Monitoring 2022.12.07 2025.05.28 Literature Database
A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System Authors: Zong-Zhi Lin, Thomas D. Pike, Mark M. Bailey, Nathaniel D. Bastian | Published: 2022-11-08 | Updated: 2024-09-06 Cyber AttackModel SelectionImprovement of Learning 2022.11.08 2025.05.28 Literature Database
Classical ensemble of Quantum-classical ML algorithms for Phishing detection in Ethereum transaction networks Authors: Anupama Ray, Sai Sakunthala Guddanti, Vishnu Ajith, Dhinakaran Vinayagamurthy | Published: 2022-10-30 Stacking ModelModel SelectionQuantum Neural Network 2022.10.30 2025.05.28 Literature Database
On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13 Performance EvaluationPrivacy AssessmentModel Selection 2022.05.13 2025.05.28 Literature Database
Ethereum Fraud Detection with Heterogeneous Graph Neural Networks Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04 Model SelectionLink Prediction MethodStructural Learning 2022.03.23 2025.05.28 Literature Database
The Role of Adaptive Optimizers for Honest Private Hyperparameter Selection Authors: Shubhankar Mohapatra, Sajin Sasy, Xi He, Gautam Kamath, Om Thakkar | Published: 2021-11-09 DP-SGDPrivacy Risk ManagementModel Selection 2021.11.09 2025.05.28 Literature Database
A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14 Model SelectionPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
AI Total: Analyzing Security ML Models with Imperfect Data in Production Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13 Data Management SystemModel SelectionUser Activity Analysis 2021.10.13 2025.05.28 Literature Database