Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28 Model EvaluationAdversarial ExampleMachine Learning Algorithm 2019.11.28 2025.05.28 Literature Database
Cascading Machine Learning to Attack Bitcoin Anonymity Authors: Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna Urrutia | Published: 2019-10-15 Data CollectionPrivacy ClassificationMachine Learning Algorithm 2019.10.15 2025.05.28 Literature Database
ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization Authors: Xiangyi Chen, Sijia Liu, Kaidi Xu, Xingguo Li, Xue Lin, Mingyi Hong, David Cox | Published: 2019-10-15 | Updated: 2019-10-16 Adversarial ExampleMachine Learning AlgorithmDesign Optimization Methods 2019.10.15 2025.05.28 Literature Database
Using Lexical Features for Malicious URL Detection — A Machine Learning Approach Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14 Cyber ThreatMalicious Website DetectionMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database
Comment on “AndrODet: An adaptive Android obfuscation detector” Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18 Software SecurityExperimental ValidationMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database
Directional Adversarial Training for Cost Sensitive Deep Learning Classification Applications Authors: Matteo Terzi, Gian Antonio Susto, Pratik Chaudhari | Published: 2019-10-08 Model Design and AccuracyMachine Learning AlgorithmAdaptive Adversarial Training 2019.10.08 2025.05.28 Literature Database
Sequence embeddings help to identify fraudulent cases in healthcare insurance Authors: I. Fursov, A. Zaytsev, R. Khasyanov, M. Spindler, E. Burnaev | Published: 2019-10-07 Membership InferenceMachine Learning AlgorithmFeature Selection Method 2019.10.07 2025.05.28 Literature Database
Algorithmic Probability-guided Supervised Machine Learning on Non-differentiable Spaces Authors: Santiago Hernández-Orozco, Hector Zenil, Jürgen Riedel, Adam Uccello, Narsis A. Kiani, Jesper Tegnér | Published: 2019-10-07 | Updated: 2019-10-08 Machine Learning AlgorithmComputational ComplexityDesign Optimization Methods 2019.10.07 2025.05.28 Literature Database
A Case Study on Using Deep Learning for Network Intrusion Detection Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05 Data CollectionAttack EvaluationMachine Learning Algorithm 2019.10.05 2025.05.28 Literature Database
PINFER: Privacy-Preserving Inference for Machine Learning Authors: Marc Joye, Fabien A. P. Petitcolas | Published: 2019-10-04 Privacy Protection MechanismHistory of CryptographyMachine Learning Algorithm 2019.10.04 2025.05.28 Literature Database