Machine Learning

Duet: An Expressive Higher-order Language and Linear Type System for Statically Enforcing Differential Privacy

Authors: Joseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song | Published: 2019-09-05
Privacy-Preserving Algorithm
Privacy Protection Mechanism
Machine Learning

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis

Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04
Model evaluation methods
Machine Learning
Feature Importance Analysis

A systematic review of fuzzing based on machine learning techniques

Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04
Data Generation Method
Performance Evaluation
Machine Learning

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

Authors: Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang | Published: 2019-08-03
Data Generation Method
Machine Learning
Feature Interdependence

Exploring the Robustness of NMT Systems to Nonsensical Inputs

Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28
BLEU Score Evaluation
Adversarial attack
Machine Learning

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28
Data Collection Method
Attack Evaluation
Machine Learning

CharBot: A Simple and Effective Method for Evading DGA Classifiers

Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30
Malware Detection
Adversarial Attack Detection
Machine Learning

Locally Differentially Private Naive Bayes Classification

Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03
Privacy Technique
Machine Learning
Dimensionality Reduction Method

Generative Adversarial Network for Wireless Signal Spoofing

Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07
Attack Scenario Analysis
Machine Learning
Physical layer security

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18
Poisoning
Model Design
Machine Learning