Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26

The Cynicism of Modern Cybercrime: Automating the Analysis of Surface Web Marketplaces

Authors: Nikolaos Lykousas, Vasilios Koutsokostas, Fran Casino, Constantinos Patsakis | Published: 2021-05-25