Machine Learning Method

SHARKS: Smart Hacking Approaches for RisK Scanning in Internet-of-Things and Cyber-Physical Systems based on Machine Learning

Authors: Tanujay Saha, Najwa Aaraj, Neel Ajjarapu, Niraj K. Jha | Published: 2021-01-07 | Updated: 2022-10-19
Attack Type
Machine Learning Method
Vulnerability Management

Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression for Data Analysis

Authors: Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong | Published: 2021-01-07 | Updated: 2021-11-22
Blockchain Technology
Machine Learning Method
Linear Model

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30
Data Generation Method
Machine Learning Method
Research Methodology

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method

Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27
Data Flow Analysis
Attack Detection
Machine Learning Method

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23
Poisoning
Machine Learning Method
Feature Importance Analysis

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors

Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22
Malware Detection
Machine Learning Method
Weight Update Method

Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03
Robustness Evaluation
Adversarial Perturbation Techniques
Machine Learning Method

Federated Transfer Learning: concept and applications

Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06
Privacy Protection Method
Information-Theoretic Privacy
Machine Learning Method

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing