Machine Learning Algorithm

Phishing Detection through Email Embeddings

Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28
Email Security
Machine Learning Algorithm
Feature Engineering

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26
Challenges of Data Labeling
Machine Learning Algorithm
Research Methodology

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24
Adversarial Example
Adversarial Example Detection
Machine Learning Algorithm

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24
Future Research
Information-Theoretic Evaluation
Machine Learning Algorithm

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23
Data Obfuscation
Privacy Protection
Machine Learning Algorithm

A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22
Text Perturbation Method
Causes of Information Leakage
Machine Learning Algorithm

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22
Data Generation
Information-Theoretic Evaluation
Machine Learning Algorithm

Profile Matching Across Online Social Networks

Authors: Anisa Halimi, Erman Ayday | Published: 2020-08-20
Data Collection
Profile Matching
Machine Learning Algorithm

ByGARS: Byzantine SGD with Arbitrary Number of Attackers

Authors: Jayanth Regatti, Hao Chen, Abhishek Gupta | Published: 2020-06-24 | Updated: 2020-12-07
Byzantine Consensus Mechanism
Poisoning
Machine Learning Algorithm

RayS: A Ray Searching Method for Hard-label Adversarial Attack

Authors: Jinghui Chen, Quanquan Gu | Published: 2020-06-23 | Updated: 2020-09-05
Membership Inference
Adversarial Attack Methods
Machine Learning Algorithm