Machine Learning Method

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method

Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27
Data Flow Analysis
Attack Detection
Machine Learning Method

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23
Poisoning
Machine Learning Method
Feature Importance Analysis

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors

Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22
Malware Detection
Machine Learning Method
Weight Update Method

Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03
Robustness Evaluation
Adversarial Perturbation Techniques
Machine Learning Method

Federated Transfer Learning: concept and applications

Authors: Sudipan Saha, Tahir Ahmad | Published: 2020-09-26 | Updated: 2021-03-06
Privacy Protection Method
Information-Theoretic Privacy
Machine Learning Method

Black Box to White Box: Discover Model Characteristics Based on Strategic Probing

Authors: Josh Kalin, Matthew Ciolino, David Noever, Gerry Dozier | Published: 2020-09-07
Adversarial Attack Methods
Machine Learning Method
Image Processing

Early Identification of Services in HTTPS Traffic

Authors: Wazen M. Shbair, Thibault Cholez, Jerome Francois, Isabelle Chrisment | Published: 2020-08-19
Performance Evaluation Metrics
Machine Learning Method
Communication Efficiency

Adversary Agnostic Robust Deep Reinforcement Learning

Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24
Policy engineering
Adversarial Attack Detection
Machine Learning Method

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18
Watermarking
Security Analysis
Machine Learning Method