Machine Learning Technology

Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity

Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27
Automation of Cybersecurity
Model Design
Machine Learning Technology

Collaborative Information Sharing for ML-Based Threat Detection

Authors: Talha Ongun, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Alastair Nottingham, Jason Hiser, Jack Davidson | Published: 2021-04-23
Privacy Protection
Machine Learning Technology
Threat Model

Voting Classifier-based Intrusion Detection for IoT Networks

Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad | Published: 2021-04-20 | Updated: 2021-04-25
ML-Based IDS
Multi-Class Classification
Machine Learning Technology

Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks

Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08
Poisoning
Model Design
Machine Learning Technology

Orthogonalizing Convolutional Layers with the Cayley Transform

Authors: Asher Trockman, J. Zico Kolter | Published: 2021-04-14
Model Design
Resource optimization
Machine Learning Technology

TenSEAL: A Library for Encrypted Tensor Operations Using Homomorphic Encryption

Authors: Ayoub Benaissa, Bilal Retiat, Bogdan Cebere, Alaa Eddine Belfedhal | Published: 2021-04-07 | Updated: 2021-04-28
Privacy Protection
Encryption Technology
Machine Learning Technology

CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Authors: Iqbal H. Sarker | Published: 2021-03-28
Multi-Class Classification
Model Selection Method
Machine Learning Technology

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31
DP-SGD
Machine Learning Technology
evaluation metrics

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04
DNS Covert Channel
Machine Learning Technology
Anomaly Detection Method

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method