Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-learning based Defense Framework

Authors: Trung V. Phan, T M Rayhan Gias, Syed Tasnimul Islam, Truong Thu Huong, Nguyen Huu Thanh, Thomas Bauschert | Published: 2019-07-27 | Updated: 2019-09-03

An Enhanced Machine Learning-based Biometric Authentication System Using RR-Interval Framed Electrocardiograms

Authors: Amang Song-Kyoo Kim, Chan Yeob Yeun, Paul D. Yoo | Published: 2019-07-27 | Updated: 2019-12-01

Understanding Adversarial Robustness: The Trade-off between Minimum and Average Margin

Authors: Kaiwen Wu, Yaoliang Yu | Published: 2019-07-26

On the Design of Black-box Adversarial Examples by Leveraging Gradient-free Optimization and Operator Splitting Method

Authors: Pu Zhao, Sijia Liu, Pin-Yu Chen, Nghia Hoang, Kaidi Xu, Bhavya Kailkhura, Xue Lin | Published: 2019-07-26 | Updated: 2019-12-04

Semisupervised Adversarial Neural Networks for Cyber Security Transfer Learning

Authors: Casey Kneale, Kolia Sadeghi | Published: 2019-07-25

Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests

Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24

Predicting Malicious Insider Threat Scenarios Using Organizational Data and a Heterogeneous Stack-Classifier

Authors: Adam James Hall, Nikolaos Pitropakis, William J Buchanan, Naghmeh Moradpoor | Published: 2019-07-24

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10

Enhancing Adversarial Example Transferability with an Intermediate Level Attack

Authors: Qian Huang, Isay Katsman, Horace He, Zeqi Gu, Serge Belongie, Ser-Nam Lim | Published: 2019-07-23 | Updated: 2020-02-27

CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection

Authors: Ayush Hariharan, Ankit Gupta, Trisha Pal | Published: 2019-07-23