HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08 PDF Malware AnalysisDataset GenerationMachine Learning Algorithm 2021.11.08 2025.05.28 Literature Database
A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02 Dataset evaluationMachine Learning AlgorithmAutomated Intrusion Detection System 2021.11.02 2025.05.28 Literature Database
DP-XGBoost: Private Machine Learning at Scale Authors: Nicolas Grislain, Joan Gonzalvez | Published: 2021-10-25 Algorithm DesignPrivacy ProtectionMachine Learning Algorithm 2021.10.25 2025.05.28 Literature Database
Orthogonal variance-based feature selection for intrusion detection systems Authors: Firuz Kamalov, Sherif Moussa, Ziad El Khatib, Adel Ben Mnaouer | Published: 2021-10-25 ML-Based IDSMachine Learning AlgorithmFeature Extraction Method 2021.10.25 2025.05.28 Literature Database
Poisoning Attacks on Fair Machine Learning Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17 Adversarial Attack MethodsMachine Learning Algorithm 2021.10.17 2025.05.28 Literature Database
A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15 Automation of CybersecurityMachine Learning AlgorithmAutomated Vulnerability Remediation 2021.10.15 2025.05.28 Literature Database
Machine Learning Algorithms In User Authentication Schemes Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15 User Activity AnalysisPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.15 2025.05.28 Literature Database
A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14 Model SelectionPerformance Evaluation MetricsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
Bandwidth Utilization Side-Channel on ML Inference Accelerators Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14 Resource Consumption AnalysisAdversarial Attack MethodsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
Not all noise is accounted equally: How differentially private learning benefits from large sampling rates Authors: Friedrich Dörmann, Osvald Frisk, Lars Nørvang Andersen, Christian Fischer Pedersen | Published: 2021-10-12 DP-SGDPrivacy ViolationMachine Learning Algorithm 2021.10.12 2025.05.28 Literature Database