Machine Learning Technology

On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27
Adversarial Example Detection
Adversarial Attack Analysis
Machine Learning Technology

Yedrouj-Net: An efficient CNN for spatial steganalysis

Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26
Privacy Design Principles
Machine Learning Technology
Research Methodology

IoT Security Techniques Based on Machine Learning

Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19
IoT Security
Reinforcement Learning Method
Machine Learning Technology

Automatic Detection of Malware-Generated Domains with Recurrent Neural Models

Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20
Malware Detection
Model Performance Evaluation
Machine Learning Technology

Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward

Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20
Model Extraction Attack
Attack Detection
Machine Learning Technology

A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data

Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07
Model Performance Evaluation
Attack Detection
Machine Learning Technology