On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16 Dataset evaluationVulnerability Attack MethodEvaluation Method 2022.03.16 2025.05.28 Literature Database
Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça | Published: 2021-12-29 Data CollectionMachine Learning TechnologyEvaluation Method 2021.12.29 2025.05.28 Literature Database
A Comprehensive Study on Learning-Based PE Malware Family Classification Methods Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29 PE Malware ClassificationPoisoningEvaluation Method 2021.10.29 2025.05.28 Literature Database
Dynamic detection of mobile malware using smartphone data and machine learning Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23 Malware ClassificationRole of Machine LearningEvaluation Method 2021.07.23 2025.05.28 Literature Database
Malware Classification Using Deep Boosted Learning Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan | Published: 2021-07-08 PE Malware ClassificationDeep Transfer LearningEvaluation Method 2021.07.08 2025.05.28 Literature Database
Bayesian Attention Belief Networks Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09 Natural Language ProcessingComputational EfficiencyEvaluation Method 2021.06.09 2025.05.28 Literature Database
On Ensemble Learning Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07 Performance EvaluationMachine Learning ApplicationEvaluation Method 2021.03.07 2025.05.28 Literature Database
Risk Management Framework for Machine Learning Security Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09 Cost EfficiencyData Protection MethodEvaluation Method 2020.12.09 2025.05.28 Literature Database
Reliable Graph Neural Networks via Robust Aggregation Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29 Adversarial ExampleCertificate RatioEvaluation Method 2020.10.29 2025.05.28 Literature Database
Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable? Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11 Adversarial ExampleChallenges of Generative ModelsEvaluation Method 2020.10.28 2025.05.28 Literature Database