Identifying Audio Adversarial Examples via Anomalous Pattern Detection Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25 Vulnerability of Adversarial ExamplesAdversarial Attack MethodsMachine Learning Application 2020.02.13 2025.05.28 Literature Database
Explainable Deep Convolutional Candlestick Learner Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29 Candlestick PatternAdversarial Perturbation TechniquesMachine Learning Application 2020.01.08 2025.05.28 Literature Database
Android Botnet Detection using Convolutional Neural Networks Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27 Botnet DetectionModel Performance EvaluationMachine Learning Application 2019.11.27 2025.05.28 Literature Database
Network Intrusion Detection based on LSTM and Feature Embedding Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26 Attack TypeMachine Learning ApplicationDeep Learning-Based IDS 2019.11.26 2025.05.28 Literature Database
Privacy preserving Neural Network Inference on Encrypted Data with GPUs Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26 Model DesignMachine Learning ApplicationImage Feature Extraction 2019.11.26 2025.05.28 Literature Database
Transaction Confirmation Time Prediction in Ethereum Blockchain Using Machine Learning Authors: Harsh Jot Singh, Abdelhakim Senhaji Hafid | Published: 2019-11-25 Blockchain EconomicsModel Performance EvaluationMachine Learning Application 2019.11.25 2025.05.28 Literature Database
Lower Bounds on Adversarial Robustness from Optimal Transport Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30 Taxonomy of AttacksAdversarial attackMachine Learning Application 2019.09.26 2025.05.28 Literature Database
HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2019-09-23 Cyber ThreatData CollectionMachine Learning Application 2019.09.23 2025.05.28 Literature Database
Multi-task Learning and Catastrophic Forgetting in Continual Reinforcement Learning Authors: João Ribeiro, Francisco S. Melo, João Dias | Published: 2019-09-22 Reinforcement Learning AttackMachine Learning ApplicationMachine Learning Technology 2019.09.22 2025.05.28 Literature Database
Challenges of Privacy-Preserving Machine Learning in IoT Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21 Privacy Protection MechanismInformation SecurityMachine Learning Application 2019.09.21 2025.05.28 Literature Database