Machine Learning Method

Peek-a-Boo: I see your smart home activities, even encrypted!

Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13
IoT Security
Traffic Characteristic Analysis
Machine Learning Method

Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer

Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson | Published: 2018-08-08 | Updated: 2019-02-17
Adversarial Learning
Adversarial attack
Machine Learning Method

Learning-Aided Physical Layer Authentication as an Intelligent Process

Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07
Training Method
Improvement of Learning
Machine Learning Method

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03
API Calls
Dataset for Malware Classification
Machine Learning Method

Robust Blind Deconvolution via Mirror Descent

Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21
Robustness Analysis
Convergence Property
Machine Learning Method

Resilient Monotone Sequential Maximization

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16
Resource Consumption Analysis
Reinforcement Learning Algorithm
Machine Learning Method

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19
FDI Attack Detection Methods
Machine Learning Method
evaluation metrics

Adversarial Logit Pairing

Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16
Certified Robustness
Adversarial Learning
Machine Learning Method

Chiron: Privacy-preserving Machine Learning as a Service

Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15
Distributed Learning
Differential Privacy
Machine Learning Method

Machine learning-assisted virtual patching of web applications

Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14
Website Vulnerability
Attack Scenario Analysis
Machine Learning Method