Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30 Data GenerationPoisoningMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Unveiling the potential of Graph Neural Networks for robust Intrusion Detection Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30 ML-Based IDSRobustnessMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Who’s Afraid of Thomas Bayes? Authors: Erick Galinkin | Published: 2021-07-30 Privacy LeakageQuantification of UncertaintyMachine Learning Algorithm 2021.07.30 2025.05.28 Literature Database
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 Privacy LeakageModel DesignMachine Learning Algorithm 2021.07.29 2025.05.28 Literature Database
PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29 AlgorithmMachine Learning AlgorithmFace Recognition System 2021.07.29 2025.05.28 Literature Database
Poisoning the Search Space in Neural Architecture Search Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28 Data-Driven Vulnerability AssessmentEfficiency EvaluationMachine Learning Algorithm 2021.06.28 2025.05.28 Literature Database
On the (Un-)Avoidability of Adversarial Examples Authors: Sadia Chowdhury, Ruth Urner | Published: 2021-06-24 Robustness EvaluationAdversarial ExampleMachine Learning Algorithm 2021.06.24 2025.05.28 Literature Database
Machine learning for risk assessment in gender-based crime Authors: Ángel González-Prieto, Antonio Brú, Juan Carlos Nuño, José Luis González-Álvarez | Published: 2021-06-22 Recidivism Prediction ModelMachine Learning AlgorithmPolice Protection Assessment 2021.06.22 2025.05.28 Literature Database
Phishing Detection through Email Embeddings Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28 Email SecurityMachine Learning AlgorithmFeature Engineering 2020.12.28 2025.05.28 Literature Database
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach Authors: Benjamin M. Ampel | Published: 2020-12-26 Challenges of Data LabelingMachine Learning AlgorithmResearch Methodology 2020.12.26 2025.05.28 Literature Database