Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15 Privacy ProtectionPerformance Evaluation MetricsDeep Learning Method 2019.12.18 2025.05.28 Literature Database
MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30 Data GenerationRobustnessPerformance Evaluation Metrics 2019.12.16 2025.05.28 Literature Database
Private Federated Learning with Domain Adaptation Authors: Daniel Peterson, Pallika Kanani, Virendra J. Marathe | Published: 2019-12-13 Privacy ProtectionPerformance Evaluation MetricsMachine Learning Technology 2019.12.13 2025.05.28 Literature Database
Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques Authors: Ibrahim Yilmaz, Rahat Masum | Published: 2019-12-10 Data GenerationPerformance Evaluation MetricsMachine Learning Technology 2019.12.10 2025.05.28 Literature Database
Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain | Published: 2019-12-02 Imbalanced DatasetPerformance Evaluation MetricsMachine Learning Technology 2019.12.02 2025.05.28 Literature Database
Neurlux: Dynamic Malware Analysis Without Feature Engineering Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna | Published: 2019-10-24 Model ArchitectureDynamic Analysis MethodPerformance Evaluation Metrics 2019.10.24 2025.05.28 Literature Database
A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2019-10-22 Sensor Information ManagementPerformance Evaluation MetricsAnomaly Detection Algorithm 2019.10.22 2025.05.28 Literature Database
An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01 User Authentication SystemPerformance Evaluation MetricsPrivacy Protection in Machine Learning 2019.07.27 2025.05.28 Literature Database
The advantages of multiple classes for reducing overfitting from test set reuse Authors: Vitaly Feldman, Roy Frostig, Moritz Hardt | Published: 2019-05-24 Model Extraction AttackImpact of GeneralizationPerformance Evaluation Metrics 2019.05.24 2025.05.28 Literature Database
Taking Care of The Discretization Problem: A Comprehensive Study of the Discretization Problem and A Black-Box Adversarial Attack in Discrete Integer Domain Authors: Lei Bu, Yuchao Duan, Fu Song, Zhe Zhao | Published: 2019-05-19 | Updated: 2020-04-26 Model EvaluationPerformance Evaluation MetricsTaxonomy of Attacks 2019.05.19 2025.05.28 Literature Database