Machine Learning Application

Deep Learning in steganography and steganalysis from 2015 to 2018

Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16
Steganography Techniques
Machine Learning Application
Deep Learning-Based IDS

Tackling Android Stego Apps in the Wild

Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01
Data Leakage
Machine Learning Application
Image Processing

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27
Model Evaluation
Machine Learning Application
Feature Selection Method

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27
Backdoor Detection
Model Evaluation
Machine Learning Application

Variance Networks: When Expectation Does Not Meet Your Expectations

Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18
Bayesian Security
Adversarial Learning
Machine Learning Application

Generative Adversarial Positive-Unlabelled Learning

Authors: Ming Hou, Brahim Chaib-draa, Chao Li, Qibin Zhao | Published: 2017-11-21 | Updated: 2018-04-04
Machine Learning Algorithm
Machine Learning Application
Generative Model Characteristics

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis

Authors: Guozhu Meng, Yinxing Xue, Jing Kai Siow, Ting Su, Annamalai Narayanan, Yang Liu | Published: 2017-11-20 | Updated: 2017-11-21
Dataset Integration
Machine Learning Application
Knowledge Extraction

Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08
Network Forensics
Botnet Detection Method
Machine Learning Application

Process Monitoring on Sequences of System Call Count Vectors

Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12
Data Collection
Machine Learning Application
Anomaly Detection Algorithm