Investigating Membership Inference Attacks under Data Dependencies Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum | Published: 2020-10-23 | Updated: 2023-06-14 Property Inference AttackMembership Disclosure Riskevaluation metrics 2020.10.23 2025.05.13 Literature Database
On Primes, Log-Loss Scores and (No) Privacy Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17 Membership InferenceMachine Learningevaluation metrics 2020.09.17 2025.05.13 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.13 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.13 Literature Database
Learning the Associations of MITRE ATT&CK Adversarial Techniques Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12 Clustering methodsAttack Pattern Extractionevaluation metrics 2020.04.16 2025.05.13 Literature Database
Privacy Enhanced Multimodal Neural Representations for Emotion Recognition Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29 Privacy ManagementAttack Methodevaluation metrics 2019.10.29 2025.05.13 Literature Database
A Note on Our Submission to Track 4 of iDASH 2019 Authors: Marcel Keller, Ke Sun | Published: 2019-10-24 Improvement of LearningEvaluation Methodevaluation metrics 2019.10.24 2025.05.13 Literature Database
Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02 Ensemble LearningMachine Learning Applicationevaluation metrics 2019.04.02 2025.05.13 Literature Database
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 FDI Attack Detection MethodsMachine Learning Methodevaluation metrics 2018.03.18 2025.05.13 Literature Database
Solving the “false positives” problem in fraud prediction Authors: Roy Wedge, James Max Kanter, Santiago Moral Rubio, Sergio Iglesias Perez, Kalyan Veeramachaneni | Published: 2017-10-20 Data Extraction and AnalysisModel evaluation methodsevaluation metrics 2017.10.20 2025.05.13 Literature Database