On the Vulnerability of Backdoor Defenses for Federated Learning Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19 DNN IP Protection MethodPoisoningFeature Importance Analysis 2023.01.19 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database
ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01 Performance Evaluation MetricsTime-Related FeaturesFeature Importance Analysis 2022.10.01 2025.05.28 Literature Database
Fraud Dataset Benchmark and Applications Authors: Prince Grover, Julia Xu, Justin Tittelfitz, Anqi Cheng, Zheng Li, Jakub Zablocki, Jianbo Liu, Hao Zhou | Published: 2022-08-30 | Updated: 2023-09-22 Dataset GenerationFeature Importance Analysis 2022.08.30 2025.05.28 Literature Database
Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30 Attack DetectionFeature Importance AnalysisVulnerability detection 2022.08.30 2025.05.28 Literature Database
IDPS Signature Classification with a Reject Option and the Incorporation of Expert Knowledge Authors: Hidetoshi Kawaguchi, Yuichi Nakatani, Shogo Okada | Published: 2022-07-19 Security AnalysisExpert Opinion CollectionFeature Importance Analysis 2022.07.19 2025.05.28 Literature Database
Interpretability in Safety-Critical FinancialTrading Systems Authors: Gabriel Deza, Adelin Travers, Colin Rowat, Nicolas Papernot | Published: 2021-09-24 Performance EvaluationMachine Learning ApplicationFeature Importance Analysis 2021.09.24 2025.05.28 Literature Database
Partial sensitivity analysis in differential privacy Authors: Tamara T. Mueller, Alexander Ziller, Dmitrii Usynin, Moritz Knolle, Friederike Jungmann, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2021-11-28 Data Privacy AssessmentPrivacy Risk ManagementFeature Importance Analysis 2021.09.22 2025.05.28 Literature Database
DualNet: Locate Then Detect Effective Payload with Deep Attention Network Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23 PoisoningMachine Learning MethodFeature Importance Analysis 2020.10.23 2025.05.28 Literature Database
Tight Second-Order Certificates for Randomized Smoothing Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15 Optimization MethodsFeature Importance AnalysisCertificate Ratio Analysis 2020.10.20 2025.05.28 Literature Database