Feature Importance Analysis

On the Vulnerability of Backdoor Defenses for Federated Learning

Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19
DNN IP Protection Method
Poisoning
Feature Importance Analysis

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17
Privacy Enhancing Technology
Model Performance Evaluation
Feature Importance Analysis

ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01
Performance Evaluation Metrics
Time-Related Features
Feature Importance Analysis

Fraud Dataset Benchmark and Applications

Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22
Dataset Generation
Feature Importance Analysis

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations

Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30
Attack Detection
Feature Importance Analysis
Vulnerability detection

IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge

Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19
Security Analysis
Expert Opinion Collection
Feature Importance Analysis

Interpretability in Safety-Critical FinancialTrading Systems

Authors: Gabriel Deza, Adelin Travers, Colin Rowat, Nicolas Papernot | Published: 2021-09-24
Performance Evaluation
Machine Learning Application
Feature Importance Analysis

Partial sensitivity analysis in differential privacy

Authors: Tamara T. Mueller, Alexander Ziller, Dmitrii Usynin, Moritz Knolle, Friederike Jungmann, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2021-11-28
Data Privacy Assessment
Privacy Risk Management
Feature Importance Analysis

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23
Poisoning
Machine Learning Method
Feature Importance Analysis

Tight Second-Order Certificates for Randomized Smoothing

Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15
Optimization Methods
Feature Importance Analysis
Certificate Ratio Analysis