Phishing Detection through Email Embeddings Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28 Email SecurityMachine Learning AlgorithmFeature Engineering 2020.12.28 2025.05.28 Literature Database
Predicting Organizational Cybersecurity Risk: A Deep Learning Approach Authors: Benjamin M. Ampel | Published: 2020-12-26 Challenges of Data LabelingMachine Learning AlgorithmResearch Methodology 2020.12.26 2025.05.28 Literature Database
ATRO: Adversarial Training with a Rejection Option Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24 Adversarial ExampleAdversarial Example DetectionMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
Graph Information Bottleneck Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24 Future ResearchInformation-Theoretic EvaluationMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23 Data ObfuscationPrivacy ProtectionMachine Learning Algorithm 2020.10.23 2025.05.28 Literature Database
A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22 Text Perturbation MethodCauses of Information LeakageMachine Learning Algorithm 2020.10.22 2025.05.28 Literature Database
On the Intrinsic Differential Privacy of Bagging Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22 Data GenerationInformation-Theoretic EvaluationMachine Learning Algorithm 2020.08.22 2025.05.28 Literature Database
Profile Matching Across Online Social Networks Authors: Anisa Halimi, Erman Ayday | Published: 2020-08-20 Data CollectionProfile MatchingMachine Learning Algorithm 2020.08.20 2025.05.28 Literature Database
ByGARS: Byzantine SGD with Arbitrary Number of Attackers Authors: Jayanth Regatti, Hao Chen, Abhishek Gupta | Published: 2020-06-24 | Updated: 2020-12-07 Byzantine Consensus MechanismPoisoningMachine Learning Algorithm 2020.06.24 2025.05.28 Literature Database
RayS: A Ray Searching Method for Hard-label Adversarial Attack Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05 Membership InferenceAdversarial Attack MethodsMachine Learning Algorithm 2020.06.23 2025.05.28 Literature Database