Machine Learning Method

Explaining Machine Learning DGA Detectors from DNS Traffic Data

Authors: Giorgio Piras, Maura Pintor, Luca Demetrio, Battista Biggio | Published: 2022-08-10
Attack Pattern Extraction
Machine Learning Method
Explainability

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10
IoT Security Risks
Performance Evaluation
Machine Learning Method

Adversarial Machine Learning-Based Anticipation of Threats Against Vehicle-to-Microgrid Services

Authors: Ahmed Omara, Burak Kantarci | Published: 2022-08-09
Performance Evaluation
Attack Evaluation
Machine Learning Method

Online Malware Classification with System-Wide System Calls in Cloud IaaS

Authors: Phillip Brown, Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2022-08-09
Malware Classification
Malware Detection Method
Machine Learning Method

Robust Machine Learning for Malware Detection over Time

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Battista Biggio | Published: 2022-08-09
Malware Detection Method
Robustness Evaluation
Machine Learning Method

LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles

Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01
Stability of Predictions
Performance Evaluation
Machine Learning Method

Lethal Dose Conjecture on Data Poisoning

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18
Robustness Evaluation
Classification Pattern Analysis
Machine Learning Method

On False Data Injection Attack against Building Automation Systems

Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25
Attack Evaluation
Attack Pattern Extraction
Machine Learning Method

Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption

Authors: Syed Imtiaz Ahamed, Vadlamani Ravi | Published: 2022-08-04
CKKS Scheme
Medical Image Analysis
Machine Learning Method

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06
Performance Evaluation
Methods for Dynamically Identifying New Classes
Machine Learning Method