Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic

Authors: Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng | Published: 2019-05-15 | Updated: 2019-12-17

Automatic Malware Description via Attribute Tagging and Similarity Embedding

Authors: Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin | Published: 2019-05-15 | Updated: 2020-01-23

Multiple perspectives HMM-based feature engineering for credit card fraud detection

Authors: Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Olivier Caelen, Liyun He-Guelton, Sylvie Calabretto, Michael Granitzer | Published: 2019-05-15

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16

Transferable Clean-Label Poisoning Attacks on Deep Neural Nets

Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16

Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters

Authors: Ghazi Al-Naymatm, Ahmed Hambouz, Mouhammd Alkasassbeh | Published: 2019-05-14 | Updated: 2019-10-19

Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14

Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12

ECG Identification under Exercise and Rest Situations via Various Learning Methods

Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11

Interpreting and Evaluating Neural Network Robustness

Authors: Fuxun Yu, Zhuwei Qin, Chenchen Liu, Liang Zhao, Yanzhi Wang, Xiang Chen | Published: 2019-05-10