Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 Feature Extraction MethodFeature Selection MethodComputational Efficiency 2023.07.04 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
Rethinking the Trigger-injecting Position in Graph Backdoor Attack Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18 Graph Neural NetworkBackdoor AttackFeature Selection Method 2023.04.05 2025.05.28 Literature Database
Effective Feature Extraction for Intrusion Detection System using Non-negative Matrix Factorization and Univariate analysis Authors: Swapnil Mane, Vaibhav Khatavkar, Niranjan Gijare, Pranav Bhendawade | Published: 2023-04-03 Data CollectionMachine Learning MethodFeature Selection Method 2023.04.03 2025.05.28 Literature Database
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15 Performance Evaluation MetricsMachine Learning TechnologyFeature Selection Method 2023.01.15 2025.05.28 Literature Database
A Dependable Hybrid Machine Learning Model for Network Intrusion Detection Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27 Model Design and AccuracyFeature Selection MethodEvaluation Method 2022.12.08 2025.05.28 Literature Database
Empowering Graph Representation Learning with Test-Time Graph Transformation Authors: Wei Jin, Tong Zhao, Jiayuan Ding, Yozen Liu, Jiliang Tang, Neil Shah | Published: 2022-10-07 | Updated: 2023-02-26 FrameworkModel DesignFeature Selection Method 2022.10.07 2025.05.28 Literature Database
Best Subset Selection with Efficient Primal-Dual Algorithm Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05 Algorithm DesignOptimization ProblemFeature Selection Method 2022.07.05 2025.05.28 Literature Database
Machine Learning in Access Control: A Taxonomy and Survey Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu | Published: 2022-07-04 Dynamic Access ControlMachine Learning ApplicationFeature Selection Method 2022.07.04 2025.05.28 Literature Database
Threat Detection for General Social Engineering Attack Using Machine Learning Techniques Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17 Dataset evaluationPerformance Evaluation MetricsFeature Selection Method 2022.03.15 2025.05.28 Literature Database