Machine Learning Technology

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27
Adversarial attack
Machine Learning Technology
Communication Loss

A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices

Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17
Performance Evaluation
Poisoning
Machine Learning Technology

A Protection against the Extraction of Neural Network Models

Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31
Adversarial attack
Machine Learning
Machine Learning Technology

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Threat Model

Keyed Non-Parametric Hypothesis Tests

Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25
Poisoning
Adversarial attack
Machine Learning Technology

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Feature Extraction Method

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08
URL-based Detection
Training Method
Machine Learning Technology

Robust binary classification with the 01 loss

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-02-09
Robustness Improvement Method
Convergence Property
Machine Learning Technology

MDEA: Malware Detection with Evolutionary Adversarial Learning

Authors: Xiruo Wang, Risto Miikkulainen | Published: 2020-02-09 | Updated: 2020-04-17
Malicious Package Detection
Machine Learning Technology
Evolutionary Algorithm

An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners

Authors: Amir Andalib, Vahid Tabataba Vakili | Published: 2020-01-31 | Updated: 2020-12-29
Security Analysis
Machine Learning Technology
Feature Extraction Method