On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27 Adversarial Example DetectionAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Yedrouj-Net: An efficient CNN for spatial steganalysis Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26 Privacy Design PrinciplesMachine Learning TechnologyResearch Methodology 2018.02.26 2025.05.28 Literature Database
IoT Security Techniques Based on Machine Learning Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19 IoT SecurityReinforcement Learning MethodMachine Learning Technology 2018.01.19 2025.05.28 Literature Database
Automatic Detection of Malware-Generated Domains with Recurrent Neural Models Authors: Pierre Lison, Vasileios Mavroeidis | Published: 2017-09-20 Malware DetectionModel Performance EvaluationMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward Authors: Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann | Published: 2017-09-20 Model Extraction AttackAttack DetectionMachine Learning Technology 2017.09.20 2025.05.28 Literature Database
A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07 Model Performance EvaluationAttack DetectionMachine Learning Technology 2017.09.10 2025.05.28 Literature Database