Feature Engineering

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25
Model Performance Evaluation
Adversarial Attack Methods
Feature Engineering

Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences

Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15
Data Collection
Efficiency Evaluation
Feature Engineering

Side-Channel Aware Fuzzing

Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14
Future Research
Feature Engineering
Evaluation Method

Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)

Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09
LSTM Model Performance Evaluation
Application of Text Classification
Feature Engineering

Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin | Published: 2018-09-01
Dataset evaluation
Performance Evaluation
Feature Engineering

VirtualIdentity: Privacy-Preserving User Profiling

Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock | Published: 2018-08-30
Privacy-Preserving Machine Learning
Feature Engineering
Secret Distributed Computation