Machine Learning Technology

IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices

Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28
IoT Device Identification
Data Protection Method
Machine Learning Technology

Decision-Aware Trust Signal Alignment for SOC Alert Triage

Authors: Israt Jahan Chowdhury, Md Abu Yousuf Tanvir | Published: 2026-01-08
コスト感度閾値
信号処理技術
Machine Learning Technology

Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation

Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29
SQL Injection Attack Detection
Data Preprocessing
Machine Learning Technology

Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points

Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12
Reliability Assessment
Machine Learning Technology
Anomaly Detection Method

Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption

Authors: Jordan Frery, Roman Bredehoft, Jakub Klemsa, Arthur Meyre, Andrei Stoian | Published: 2025-05-12
LLM Security
Cryptography
Machine Learning Technology

FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning

Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08
Privacy Design Principles
Model Design
Machine Learning Technology

Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems

Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06
Attack Type
Adversarial Example
Machine Learning Technology

Acoustic Side-Channel Attacks on a Computer Mouse

Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05
Changes in User Behavior
Machine Learning Technology
Speech Recognition System

Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models

Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05
Online Learning
Application of Text Classification
Machine Learning Technology

Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers

Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30
Malware Classification
Factors of Performance Degradation
Machine Learning Technology