Evaluation Method

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16
Dataset evaluation
Vulnerability Attack Method
Evaluation Method

Anomaly Detection in Cyber-Physical Systems: Reconstruction of a Prediction Error Feature Space

Authors: Nuno Oliveira, Norberto Sousa, Jorge Oliveira, Isabel Praça | Published: 2021-12-29
Data Collection
Machine Learning Technology
Evaluation Method

A Comprehensive Study on Learning-Based PE Malware Family Classification Methods

Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29
PE Malware Classification
Poisoning
Evaluation Method

Dynamic detection of mobile malware using smartphone data and machine learning

Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23
Malware Classification
Role of Machine Learning
Evaluation Method

Malware Classification Using Deep Boosted Learning

Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan | Published: 2021-07-08
PE Malware Classification
Deep Transfer Learning
Evaluation Method

Bayesian Attention Belief Networks

Authors: Shujian Zhang, Xinjie Fan, Bo Chen, Mingyuan Zhou | Published: 2021-06-09
Natural Language Processing
Computational Efficiency
Evaluation Method

On Ensemble Learning

Authors: Mark Stamp, Aniket Chandak, Gavin Wong, Allen Ye | Published: 2021-03-07
Performance Evaluation
Machine Learning Application
Evaluation Method

Risk Management Framework for Machine Learning Security

Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09
Cost Efficiency
Data Protection Method
Evaluation Method

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29
Adversarial Example
Certificate Ratio
Evaluation Method

Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?

Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11
Adversarial Example
Challenges of Generative Models
Evaluation Method