A Comprehensive Study on Learning-Based PE Malware Family Classification Methods Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29 PE Malware ClassificationPoisoningEvaluation Method 2021.10.29 2025.05.28 Literature Database
Dynamic detection of mobile malware using smartphone data and machine learning Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23 Malware ClassificationRole of Machine LearningEvaluation Method 2021.07.23 2025.05.28 Literature Database
Malware Classification Using Deep Boosted Learning Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan | Published: 2021-07-08 PE Malware ClassificationDeep Transfer LearningEvaluation Method 2021.07.08 2025.05.28 Literature Database
Bayesian Attention Belief Networks Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09 Natural Language ProcessingComputational EfficiencyEvaluation Method 2021.06.09 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 Performance EvaluationMachine Learning ApplicationEvaluation Method 2021.03.07 2025.05.28 Literature Database
Risk Management Framework for Machine Learning Security Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09 Cost EfficiencyData Protection MethodEvaluation Method 2020.12.09 2025.05.28 Literature Database
Reliable Graph Neural Networks via Robust Aggregation Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29 Adversarial ExampleCertificate RatioEvaluation Method 2020.10.29 2025.05.28 Literature Database
Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable? Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11 Adversarial ExampleChallenges of Generative ModelsEvaluation Method 2020.10.28 2025.05.28 Literature Database
Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26 Membership InferenceInformation Embedding AttackEvaluation Method 2020.10.26 2025.05.28 Literature Database
MACE: A Flexible Framework for Membership Privacy Estimation in Generative Models Authors: Yixi Xu, Sumit Mukherjee, Xiyang Liu, Shruti Tople, Rahul Dodhia, Juan Lavista Ferres | Published: 2020-09-11 | Updated: 2022-10-12 Data GenerationMembership Disclosure RiskEvaluation Method 2020.09.11 2025.05.28 Literature Database