Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks

Authors: Jordan Landford, Rich Meier, Richard Barella, Xinghui Zhao, Eduardo Cotilla-Sanchez, Robert B. Bass, Scott Wallace | Published: 2015-09-17

Fame for sale: efficient detection of fake Twitter followers

Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi | Published: 2015-09-14 | Updated: 2015-11-10

Anomaly Detection for malware identification using Hardware Performance Counters

Authors: Alberto Garcia-Serrano | Published: 2015-08-29

On the Privacy Properties of Variants on the Sparse Vector Technique

Authors: Yan Chen, Ashwin Machanavajjhala | Published: 2015-08-28

Encrypted statistical machine learning: new privacy preserving methods

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-27

A review of homomorphic encryption and software tools for encrypted statistical machine learning

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-26

Efficient Private Statistics with Succinct Sketches

Authors: Luca Melis, George Danezis, Emiliano De Cristofaro | Published: 2015-08-25 | Updated: 2016-01-06

Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features

Authors: Joshua Saxe, Konstantin Berlin | Published: 2015-08-13 | Updated: 2015-09-03

Automatic Extraction of the Passing Strategies of Soccer Teams

Authors: Laszlo Gyarmati, Xavier Anguera | Published: 2015-08-10

Using Deep Learning for Detecting Spoofing Attacks on Speech Signals

Authors: Alan Godoy, Flávio Simões, José Augusto Stuchi, Marcus de Assis Angeloni, Mário Uliani, Ricardo Violato | Published: 2015-08-07 | Updated: 2016-01-19