A Hybrid Approach: Utilising Kmeans Clustering and Naive Bayes for IoT Anomaly Detection Authors: Lincoln Best, Ernest Foo, Hui Tian | Published: 2022-05-09 Attack MethodMachine Learning MethodTemperature Conditions 2022.05.09 2025.05.28 Literature Database
Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19 User Behavior AnalysisAttack TypeMachine Learning Method 2022.04.19 2025.05.28 Literature Database
Automatic Hardware Trojan Insertion using Machine Learning Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18 Algorithm DesignTrojan DetectionMachine Learning Method 2022.04.18 2025.05.28 Literature Database
Exploiting Multiple EEG Data Domains with Adversarial Learning Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16 Dataset evaluationMachine Learning MethodGenerative Adversarial Network 2022.04.16 2025.05.28 Literature Database
Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16 Privacy Enhancing TechnologyCryptographic ProtocolMachine Learning Method 2022.04.16 2025.05.28 Literature Database
ML Supported Predictions for SAT Solvers Performance Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17 Model DesignPerformance Evaluation MetricsMachine Learning Method 2021.12.17 2025.05.28 Literature Database
Deep Bayesian Learning for Car Hacking Detection Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17 Machine Learning MethodDeep Learning MethodVulnerabilities in Autonomous Driving Technology 2021.12.17 2025.05.28 Literature Database
Model Stealing Attacks Against Inductive Graph Neural Networks Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15 Graph Representation LearningAdversarial TrainingMachine Learning Method 2021.12.15 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database
MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14 Link Prediction MethodPerformance Evaluation MetricsMachine Learning Method 2021.12.14 2025.05.28 Literature Database