Machine Learning Algorithm

Learning to Confuse: Generating Training Time Adversarial Data with Auto-Encoder

Authors: Ji Feng, Qi-Zhi Cai, Zhi-Hua Zhou | Published: 2019-05-22
Poisoning
Effective Perturbation Methods
Machine Learning Algorithm

Android Malicious Application Classification Using Clustering

Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21
Dataset Analysis
Malware Detection
Machine Learning Algorithm

Universal Lipschitz Approximation in Bounded Depth Neural Networks

Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09
Robustness Analysis
Polynomial Approximation
Machine Learning Algorithm

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

Minimum Uncertainty Based Detection of Adversaries in Deep Neural Networks

Authors: Fatemeh Sheikholeslami, Swayambhoo Jain, Georgios B. Giannakis | Published: 2019-04-05 | Updated: 2020-10-15
Adversarial attack
Machine Learning Algorithm
Deep Learning Method

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
Adversarial attack
Machine Learning Algorithm
Machine Learning Application

Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon | Published: 2019-04-03
IoT-Specific Threats
Signal Processing Techniques
Machine Learning Algorithm

Detection of LDDoS Attacks Based on TCP Connection Parameters

Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12
DDoS Attack
TCP Connection Characteristics
Machine Learning Algorithm

Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning

Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens | Published: 2019-03-06
Sensor Information Management
Data Dependency
Machine Learning Algorithm