Secure and Robust Machine Learning for Healthcare: A Survey

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21

An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14

Intelligent Methods for Accurately Detecting Phishing Websites

Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19

Pelican: A Deep Residual Network for Network Intrusion Detection

Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08

Ownership preserving AI Market Places using Blockchain

Authors: Nishant Baranwal Somy, Kalapriya Kannan, Vijay Arya, Sandeep Hans, Abhishek Singh, Pranay Lohia, Sameep Mehta | Published: 2020-01-18

Detecting Network Anomalies using Rule-based machine learning within SNMP-MIB dataset

Authors: Abdalrahman Hwoij, Mouhammd Al-kasassbeh, Mustafa Al-Fayoumi | Published: 2020-01-18

IPPO: A Privacy-Aware Architecture for Decentralized Data-sharing

Authors: Maurizio Aiello, Enrico Cambiaso, Roberto Canonico, Leonardo Maccari, Marco Mellia, Antonio Pescapè, Ivan Vaccari | Published: 2020-01-17

Cyber Attack Detection thanks to Machine Learning Algorithms

Authors: Antoine Delplace, Sheryl Hermoso, Kristofer Anandita | Published: 2020-01-17

Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks

Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16

A simple way to make neural networks robust against diverse image corruptions

Authors: Evgenia Rusak, Lukas Schott, Roland S. Zimmermann, Julian Bitterwolf, Oliver Bringmann, Matthias Bethge, Wieland Brendel | Published: 2020-01-16 | Updated: 2020-07-22