Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22 PoisoningEffective Perturbation MethodsMachine Learning Algorithm 2019.05.22 2025.05.28 Literature Database
Android Malicious Application Classification Using Clustering Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21 Dataset AnalysisMalware DetectionMachine Learning Algorithm 2019.04.21 2025.05.28 Literature Database
Universal Lipschitz Approximation in Bounded Depth Neural Networks Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09 Robustness AnalysisPolynomial ApproximationMachine Learning Algorithm 2019.04.09 2025.05.28 Literature Database
A Compendium on Network and Host based Intrusion Detection Systems Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.06 2025.05.28 Literature Database
Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15 Adversarial attackMachine Learning AlgorithmDeep Learning Method 2019.04.05 2025.05.28 Literature Database
Malware Detection using Machine Learning and Deep Learning Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04 Machine Learning AlgorithmMachine Learning ApplicationDeep Learning Method 2019.04.04 2025.05.28 Literature Database
White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04 Adversarial attackMachine Learning AlgorithmMachine Learning Application 2019.04.04 2025.05.28 Literature Database
Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon | Published: 2019-04-03 IoT-Specific ThreatsSignal Processing TechniquesMachine Learning Algorithm 2019.04.03 2025.05.28 Literature Database
Detection of LDDoS Attacks Based on TCP Connection Parameters Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12 DDoS AttackTCP Connection CharacteristicsMachine Learning Algorithm 2019.03.12 2025.05.28 Literature Database
Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens | Published: 2019-03-06 Sensor Information ManagementData DependencyMachine Learning Algorithm 2019.03.06 2025.05.28 Literature Database