Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection

Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning

Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta | Published: 2021-05-19

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25

Darknet Data Mining — A Canadian Cyber-crime Perspective

Authors: Edward Crowder, Jay Lansiquot | Published: 2021-05-18

Machine learning on knowledge graphs for context-aware security monitoring

Authors: Josep Soler Garrido, Dominik Dold, Johannes Frank | Published: 2021-05-18

Adversarial Examples Detection with Bayesian Neural Network

Authors: Yao Li, Tongyi Tang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-05-18 | Updated: 2024-02-23

On the Robustness of Domain Constraints

Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07