Machine Learning

Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach

Authors: Parker Lamb, Alexander Millar, Ramon Fuentes | Published: 2020-07-27 | Updated: 2020-10-13
Bayesian Classification
Changes in User Behavior
Machine Learning

Federated Learning and Differential Privacy: Software tools analysis, the Sherpa.ai FL framework and methodological guidelines for preserving data privacy

Authors: Nuria Rodríguez-Barroso, Goran Stipcich, Daniel Jiménez-López, José Antonio Ruiz-Millán, Eugenio Martínez-Cámara, Gerardo González-Seco, M. Victoria Luzón, Miguel Ángel Veganzones, Francisco Herrera | Published: 2020-07-02 | Updated: 2020-10-06
Privacy Management
Machine Learning
Federated Learning

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28
Performance Evaluation
Privacy Assessment
Machine Learning

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22
Performance Evaluation
Attack Evaluation
Machine Learning

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27
Algorithm
Machine Learning
Machine Learning Technology

A Protection against the Extraction of Neural Network Models

Authors: Hervé Chabanne, Vincent Despiegel, Linda Guiga | Published: 2020-05-26 | Updated: 2020-07-31
Adversarial attack
Machine Learning
Machine Learning Technology

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Threat Model

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Feature Extraction Method

Adversarial Machine Learning in Network Intrusion Detection Systems

Authors: Elie Alhajjar, Paul Maxwell, Nathaniel D. Bastian | Published: 2020-04-23
Adversarial Example
Adversarial Attack Methods
Machine Learning

ArchNet: Data Hiding Model in Distributed Machine Learning System

Authors: Kaiyan Chang, Wei Jiang, Jinyu Zhan, Zicheng Gong, Weijia Pan | Published: 2020-04-23 | Updated: 2020-05-31
Encryption Protocol
Machine Learning
Image Processing