Patch augmentation: Towards efficient decision boundaries for neural networks Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25 Model Performance EvaluationAdversarial Attack MethodsFeature Engineering 2019.11.08 2025.05.28 Literature Database
Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15 Data CollectionEfficiency EvaluationFeature Engineering 2019.08.15 2025.05.28 Literature Database
Side-Channel Aware Fuzzing Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14 Future ResearchFeature EngineeringEvaluation Method 2019.08.14 2025.05.28 Literature Database
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09 LSTM Model Performance EvaluationApplication of Text ClassificationFeature Engineering 2019.08.09 2025.05.28 Literature Database
Machine Learning Methods for Network Intrusion Detection Authors: Mouhammad Alkasassbeh, Mohammad Almseidin | Published: 2018-09-01 Dataset evaluationPerformance EvaluationFeature Engineering 2018.09.01 2025.05.28 Literature Database
VirtualIdentity: Privacy-Preserving User Profiling Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock | Published: 2018-08-30 Privacy-Preserving Machine LearningFeature EngineeringSecret Distributed Computation 2018.08.30 2025.05.28 Literature Database