Machine Learning Algorithm

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08
PDF Malware Analysis
Dataset Generation
Machine Learning Algorithm

A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks

Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02
Dataset evaluation
Machine Learning Algorithm
Automated Intrusion Detection System

DP-XGBoost: Private Machine Learning at Scale

Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25
Algorithm Design
Privacy Protection
Machine Learning Algorithm

Orthogonal variance-based feature selection for intrusion detection systems

Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25
ML-Based IDS
Machine Learning Algorithm
Feature Extraction Method

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17
Adversarial Attack Methods
Machine Learning Algorithm

A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15
Automation of Cybersecurity
Machine Learning Algorithm
Automated Vulnerability Remediation

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15
User Activity Analysis
Performance Evaluation Metrics
Machine Learning Algorithm

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14
Model Selection
Performance Evaluation Metrics
Machine Learning Algorithm

Bandwidth Utilization Side-Channel on ML Inference Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14
Resource Consumption Analysis
Adversarial Attack Methods
Machine Learning Algorithm

Not all noise is accounted equally: How differentially private learning benefits from large sampling rates

Authors: Friedrich Dörmann, Osvald Frisk, Lars Nørvang Andersen, Christian Fischer Pedersen | Published: 2021-10-12
DP-SGD
Privacy Violation
Machine Learning Algorithm