Machine Learning in IoT Security: Current Solutions and Future Challenges Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14 Characteristics of IoT NetworksMachine Learning MethodDeep Learning 2019.03.14 2025.05.28 Literature Database
Peek-a-Boo: I see your smart home activities, even encrypted! Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13 IoT SecurityTraffic Characteristic AnalysisMachine Learning Method 2018.08.08 2025.05.28 Literature Database
Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson | Published: 2018-08-08 | Updated: 2019-02-17 Adversarial LearningAdversarial attackMachine Learning Method 2018.08.08 2025.05.28 Literature Database
Learning-Aided Physical Layer Authentication as an Intelligent Process Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07 Training MethodImprovement of LearningMachine Learning Method 2018.08.07 2025.05.28 Literature Database
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial Authors: Andrii Shalaginov, Sergii Banin, Ali Dehghantanha, Katrin Franke | Published: 2018-08-03 API CallsDataset for Malware ClassificationMachine Learning Method 2018.08.03 2025.05.28 Literature Database
Robust Blind Deconvolution via Mirror Descent Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21 Robustness AnalysisConvergence PropertyMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 FDI Attack Detection MethodsMachine Learning Methodevaluation metrics 2018.03.18 2025.05.28 Literature Database
Adversarial Logit Pairing Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16 Certified RobustnessAdversarial LearningMachine Learning Method 2018.03.16 2025.05.28 Literature Database
Chiron: Privacy-preserving Machine Learning as a Service Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15 Distributed LearningDifferential PrivacyMachine Learning Method 2018.03.15 2025.05.28 Literature Database