Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression Authors: Martin Gubri | Published: 2018-01-06 Certified RobustnessAdversarial Attack MethodsMachine Learning Algorithm 2018.01.06 2025.05.28 Literature Database
Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice? Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05 Experimental ValidationMathematical AnalysisMachine Learning Algorithm 2018.01.05 2025.05.28 Literature Database
Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13 Code GenerationExperimental ValidationMachine Learning Algorithm 2018.01.03 2025.05.28 Literature Database
Did you hear that? Adversarial Examples Against Automatic Speech Recognition Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02 Adversarial Attack MethodsMachine Learning AlgorithmSpeech Enhancement Technology 2018.01.02 2025.05.28 Literature Database
A Deep Belief Network Based Machine Learning System for Risky Host Detection Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29 Risk ManagementPerformance Evaluation MetricsMachine Learning Algorithm 2017.12.29 2025.05.28 Literature Database
Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16 Model DesignMachine Learning AlgorithmMachine Learning Framework 2017.12.29 2025.05.28 Literature Database
An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods Authors: Mouhammd Alkasassbeh | Published: 2017-12-27 Machine Learning AlgorithmFeature Selection MethodCommunication System 2017.12.27 2025.05.28 Literature Database
Query-limited Black-box Attacks to Classifiers Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23 Query Generation MethodAdversarial Attack MethodsMachine Learning Algorithm 2017.12.23 2025.05.28 Literature Database
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16 ML-Based IDSProactive DefenseMachine Learning Algorithm 2017.12.16 2025.05.28 Literature Database
Improving Malware Detection Accuracy by Extracting Icon Information Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10 Clustering methodsMachine Learning AlgorithmImage Feature Extraction 2017.12.10 2025.05.28 Literature Database