Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Mitigating Statistical Bias within Differentially Private Synthetic Data Authors: Sahra Ghalebikesabi, Harrison Wilde, Jack Jewson, Arnaud Doucet, Sebastian Vollmer, Chris Holmes | Published: 2021-08-24 | Updated: 2022-05-19 Data GenerationPrivacy AssessmentMachine Learning Method 2021.08.24 2025.05.28 Literature Database
Revisiting IoT Device Identification Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16 User Behavior AnalysisMachine Learning MethodAdaptive Retraining Mechanism 2021.07.16 2025.05.28 Literature Database
OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15 Byzantine ResilienceMachine Learning MethodFederated Learning 2021.07.12 2025.05.28 Literature Database
Segmented Federated Learning for Adaptive Intrusion Detection System Authors: Geet Shingi, Harsh Saglani, Preeti Jain | Published: 2021-07-02 CybersecurityMachine Learning MethodFederated Learning 2021.07.02 2025.05.28 Literature Database
Robust and Fully-Dynamic Coreset for Continuous-and-Bounded Learning (With Outliers) Problems Authors: Zixiu Wang, Yiwen Guo, Hu Ding | Published: 2021-06-30 | Updated: 2022-01-21 Core Set ConstructionRobustnessMachine Learning Method 2021.06.30 2025.05.28 Literature Database
Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31 ML-Based IDSMachine Learning MethodAnomaly Detection Method 2021.03.31 2025.05.28 Literature Database
Exploring Edge TPU for Network Intrusion Detection in IoT Authors: Seyedehfaezeh Hosseininoorbin, Siamak Layeghy, Mohanad Sarhan, Raja Jurdak, Marius Portmann | Published: 2021-03-30 ML-Based IDSModel SelectionMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Early Detection of In-Memory Malicious Activity based on Run-time Environmental Features Authors: Dorel Yaffe, Danny Hendler | Published: 2021-03-30 Data PreprocessingClassification of Malicious ActorsMachine Learning Method 2021.03.30 2025.05.28 Literature Database
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14 Performance EvaluationMachine Learning MethodGenerative Adversarial Network 2021.01.12 2025.05.28 Literature Database