Machine Learning Algorithm

Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One

Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28
Model Evaluation
Adversarial Example
Machine Learning Algorithm

Cascading Machine Learning to Attack Bitcoin Anonymity

Authors: Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna Urrutia | Published: 2019-10-15
Data Collection
Privacy Classification
Machine Learning Algorithm

ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization

Authors: Xiangyi Chen, Sijia Liu, Kaidi Xu, Xingguo Li, Xue Lin, Mingyi Hong, David Cox | Published: 2019-10-15 | Updated: 2019-10-16
Adversarial Example
Machine Learning Algorithm
Design Optimization Methods

Using Lexical Features for Malicious URL Detection — A Machine Learning Approach

Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14
Cyber Threat
Malicious Website Detection
Machine Learning Algorithm

Comment on “AndrODet: An adaptive Android obfuscation detector”

Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18
Software Security
Experimental Validation
Machine Learning Algorithm

Directional Adversarial Training for Cost Sensitive Deep Learning Classification Applications

Authors: Matteo Terzi, Gian Antonio Susto, Pratik Chaudhari | Published: 2019-10-08
Model Design and Accuracy
Machine Learning Algorithm
Adaptive Adversarial Training

Sequence embeddings help to identify fraudulent cases in healthcare insurance

Authors: I. Fursov, A. Zaytsev, R. Khasyanov, M. Spindler, E. Burnaev | Published: 2019-10-07
Membership Inference
Machine Learning Algorithm
Feature Selection Method

Algorithmic Probability-guided Supervised Machine Learning on Non-differentiable Spaces

Authors: Santiago Hernández-Orozco, Hector Zenil, Jürgen Riedel, Adam Uccello, Narsis A. Kiani, Jesper Tegnér | Published: 2019-10-07 | Updated: 2019-10-08
Machine Learning Algorithm
Computational Complexity
Design Optimization Methods

A Case Study on Using Deep Learning for Network Intrusion Detection

Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05
Data Collection
Attack Evaluation
Machine Learning Algorithm

PINFER: Privacy-Preserving Inference for Machine Learning

Authors: Marc Joye, Fabien A. P. Petitcolas | Published: 2019-10-04
Privacy Protection Mechanism
History of Cryptography
Machine Learning Algorithm