Machine Learning Technology

I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic

Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05
Application Classification Method
Changes in User Behavior
Machine Learning Technology

Layered Uploading for Quantum Convolutional Neural Networks

Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13
Model Design
Loss Function
Machine Learning Technology

In-Context Unlearning: Language Models as Few Shot Unlearners

Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06
Data Leakage
Performance Evaluation
Machine Learning Technology

Compact: Approximating Complex Activation Functions for Secure Computation

Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian | Published: 2023-09-09 | Updated: 2024-03-17
MPC Algorithm
Multi-Party Computation
Machine Learning Technology

MONDEO: Multistage Botnet Detection

Authors: Duarte Dias, Bruno Sousa, Nuno Antunes | Published: 2023-08-31
Efficiency Evaluation
Unknown Attack Detection
Machine Learning Technology

Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning

Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30
Interpretation of Topic Models
Classification of Malicious Actors
Machine Learning Technology

A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18
Data Collection
Model Performance Evaluation
Machine Learning Technology

Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems

Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08
Cyber Attack
Machine Learning Technology

Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage

Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08
Data Protection Method
Membership Disclosure Risk
Machine Learning Technology

Exploiting Code Symmetries for Learning Program Semantics

Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana | Published: 2023-08-07 | Updated: 2024-09-08
Program Interpretation Graph
Machine Learning Technology
Vulnerability detection