Machine Learning Algorithm

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang | Published: 2019-09-04
Graph Construction
Data Management System
Machine Learning Algorithm

Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform

Authors: Mathias Lecuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu | Published: 2019-09-04 | Updated: 2019-09-06
Data Management System
Privacy Protection Mechanism
Machine Learning Algorithm

Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15
Future Research
Machine Learning Algorithm
Feature Selection Method

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis

Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15
Text Extraction Method
Information Extraction
Machine Learning Algorithm

Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder

Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22
Poisoning
Effective Perturbation Methods
Machine Learning Algorithm

Android Malicious Application Classification Using Clustering

Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21
Dataset Analysis
Malware Detection
Machine Learning Algorithm

Universal Lipschitz Approximation in Bounded Depth Neural Networks

Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09
Robustness Analysis
Polynomial Approximation
Machine Learning Algorithm

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method