Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection Authors: Benedikt Holmes, Arthur Drichel, Ulrike Meyer | Published: 2021-10-12 Data GenerationPrivacy ViolationMachine Learning Algorithm 2021.10.12 2025.05.28 Literature Database
Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25 AlgorithmHyperparameter OptimizationMachine Learning Algorithm 2021.08.01 2025.05.28 Literature Database
Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30 Data GenerationPoisoningMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Unveiling the potential of Graph Neural Networks for robust Intrusion Detection Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30 ML-Based IDSRobustnessMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Who’s Afraid of Thomas Bayes? Authors: Erick Galinkin | Published: 2021-07-30 Privacy LeakageQuantification of UncertaintyMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 Privacy LeakageModel DesignMachine Learning Algorithm 2021.07.29 2025.05.28 Literature Database
PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29 AlgorithmMachine Learning AlgorithmFace Recognition System 2021.07.29 2025.05.28 Literature Database
Poisoning the Search Space in Neural Architecture Search Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28 Data-Driven Vulnerability AssessmentEfficiency EvaluationMachine Learning Algorithm 2021.06.28 2025.05.28 Literature Database
On the (Un-)Avoidability of Adversarial Examples Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24 Robustness EvaluationAdversarial ExampleMachine Learning Algorithm 2021.06.24 2025.05.28 Literature Database
Machine learning for risk assessment in gender-based crime Authors: Ángel González-Prieto, Antonio Brú, Juan Carlos Nuño, José Luis González-Álvarez | Published: 2021-06-22 Recidivism Prediction ModelMachine Learning AlgorithmPolice Protection Assessment 2021.06.22 2025.05.28 Literature Database