evaluation metrics

On the impossibility of non-trivial accuracy under fairness constraints

Authors: Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia | Published: 2021-07-14 | Updated: 2021-11-23
Data Privacy Assessment
Model Design and Accuracy
evaluation metrics

ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning

Authors: Oliver Lutz, Huili Chen, Hossein Fereidooni, Christoph Sendner, Alexandra Dmitrienko, Ahmad Reza Sadeghi, Farinaz Koushanfar | Published: 2021-03-23
Multi-output Model
Vulnerability detection
evaluation metrics

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06
Flow Aggregation Method
Attack Detection
evaluation metrics

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31
DP-SGD
Machine Learning Technology
evaluation metrics

Investigating Membership Inference Attacks under Data Dependencies

Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum | Published: 2020-10-23 | Updated: 2023-06-14
Property Inference Attack
Membership Disclosure Risk
evaluation metrics

On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17
Membership Inference
Machine Learning
evaluation metrics

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29
Algorithm
Poisoning
evaluation metrics

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12
Clustering methods
Attack Pattern Extraction
evaluation metrics

Privacy Enhanced Multimodal Neural Representations for Emotion Recognition

Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29
Privacy Management
Attack Method
evaluation metrics