Performance Evaluation

Generating Practical Adversarial Network Traffic Flows Using NIDSGAN

Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13
Active Learning
Network Threat Detection
Performance Evaluation

Training language models to follow instructions with human feedback

Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04
Alignment
User Behavior Analysis
Performance Evaluation

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21
PLC Programming
Performance Evaluation
Machine Learning Framework

Vulnerability Analysis of the Android Kernel

Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20
Membership Inference
Performance Evaluation
Vulnerability Prediction

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham | Published: 2021-10-06
Steganography Techniques
Malware Detection Method
Performance Evaluation

Task-aware Privacy Preservation for Multi-dimensional Data

Authors: Jiangnan Cheng, Ao Tang, Sandeep Chinchali | Published: 2021-10-05 | Updated: 2022-08-08
Algorithm
Privacy Risk Management
Performance Evaluation

Machine learning attack on copy detection patterns: are 1×1 patterns cloneable?

Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06
Algorithm
Data Generation
Performance Evaluation

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05
Data Generation
Performance Evaluation
Intellectual Property Protection

An energy-based model for neuro-symbolic reasoning on knowledge graphs

Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04
Algorithm
Performance Evaluation
Machine Learning Application

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Authors: Han Wang | Published: 2021-10-04
Data Leakage
Fingerprinting Method
Performance Evaluation