Early Identification of Services in HTTPS Traffic Authors: Wazen M. Shbair, Thibault Cholez, Jerome Francois, Isabelle Chrisment | Published: 2020-08-19 Performance Evaluation MetricsMachine Learning MethodCommunication Efficiency 2020.08.19 2025.05.28 Literature Database
Adversary Agnostic Robust Deep Reinforcement Learning Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24 Policy engineeringAdversarial Attack DetectionMachine Learning Method 2020.08.14 2025.05.28 Literature Database
Deep-Lock: Secure Authorization for Deep Neural Networks Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18 WatermarkingSecurity AnalysisMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Detecting Abnormal Traffic in Large-Scale Networks Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13 Multi-Class ClassificationMachine Learning MethodAnomaly Detection Method 2020.08.13 2025.05.28 Literature Database
WAFFLe: Weight Anonymized Factorization for Federated Learning Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13 PoisoningPersonalization MethodMachine Learning Method 2020.08.13 2025.05.28 Literature Database
Multi-Task Variational Information Bottleneck Authors: Weizhu Qian, Bowei Chen, Yichao Zhang, Guanghui Wen, Franck Gechter | Published: 2020-07-01 | Updated: 2021-03-01 Algorithm DesignGeneralization PerformanceMachine Learning Method 2020.07.01 2025.05.28 Literature Database
A Le Cam Type Bound for Adversarial Learning and Applications Authors: Qiuling Xu, Kevin Bello, Jean Honorio | Published: 2020-07-01 | Updated: 2021-02-10 Adversarial ExampleAdversarial attackMachine Learning Method 2020.07.01 2025.05.28 Literature Database
On Intrinsic Dataset Properties for Adversarial Machine Learning Authors: Jeffrey Z. Pan, Nicholas Zufelt | Published: 2020-05-19 PoisoningPerformance Evaluation MetricsMachine Learning Method 2020.05.19 2025.05.28 Literature Database
An Overview of Privacy in Machine Learning Authors: Emiliano De Cristofaro | Published: 2020-05-18 Privacy TechniqueMembership InferenceMachine Learning Method 2020.05.18 2025.05.28 Literature Database
A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database