Machine Learning

Android Malware Category and Family Detection and Identification using Machine Learning

Authors: Ahmed Hashem El Fiky, Ayman El Shenawy, Mohamed Ashraf Madkour | Published: 2021-07-05
Security Analysis
Machine Learning
Machine Learning Technology

Sleeper Agent: Scalable Hidden Trigger Backdoors for Neural Networks Trained from Scratch

Authors: Hossein Souri, Liam Fowl, Rama Chellappa, Micah Goldblum, Tom Goldstein | Published: 2021-06-16 | Updated: 2022-10-13
Backdoor Attack
Poisoning
Machine Learning

Reinforced Few-Shot Acquisition Function Learning for Bayesian Optimization

Authors: Bing-Jing Hsieh, Ping-Chun Hsieh, Xi Liu | Published: 2021-06-08
Reinforcement Learning
Optimization Methods
Machine Learning

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07
Risk Analysis Method
Adversarial Text Purification
Machine Learning

Malware Classification with Word Embedding Features

Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03
Multi-Class Classification
Membership Inference
Machine Learning

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02
Backdoor Attack
Attack Method
Machine Learning

Deep Learning Methods for Credit Card Fraud Detection

Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar | Published: 2020-12-07
Machine Learning
Self-Learning Method
Weight Update Method

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04
Machine Learning
Deep Learning
Anomaly Detection Algorithm

Intrusion Detection Systems for IoT: opportunities and challenges offered by Edge Computing and Machine Learning

Authors: Pietro Spadaccino, Francesca Cuomo | Published: 2020-12-02 | Updated: 2022-04-14
Machine Learning
Anomaly Detection Method
Communication Efficiency

Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders

Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02
Attack Method
Machine Learning
Financial Intelligence