データセット評価

Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning

Authors: Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, Jie Tang | Published: 2021-11-08
データセット評価
ポイズニング
一般化性能

A Cyber Threat Intelligence Sharing Scheme based on Federated Learning for Network Intrusion Detection

Authors: Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann | Published: 2021-11-04
データセット評価
プライバシー保護
連合学習

A Comparative Analysis of Machine Learning Algorithms for Intrusion Detection in Edge-Enabled IoT Networks

Authors: Poornima Mahadevappa, Syeda Mariam Muzammal, Raja Kumar Murugesan | Published: 2021-11-02
データセット評価
機械学習アルゴリズム
自動化された侵入検知システム

Machine Learning for Network-based Intrusion Detection Systems: an Analysis of the CIDDS-001 Dataset

Authors: José Carneiro, Nuno Oliveira, Norberto Sousa, Eva Maia, Isabel Praça | Published: 2021-07-02
データセット評価
モデル性能評価
攻撃の評価

How does Heterophily Impact the Robustness of Graph Neural Networks? Theoretical Connections and Practical Implications

Authors: Jiong Zhu, Junchen Jin, Donald Loveland, Michael T. Schaub, Danai Koutra | Published: 2021-06-14 | Updated: 2022-07-23
データセット評価
モデルの設計や精度
攻撃の分類

IoTDevID: A Behavior-Based Device Identification Method for the IoT

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19
データセット評価
データ収集
モデル性能評価

Towards Certifying L-infinity Robustness using Neural Networks with L-inf-dist Neurons

Authors: Bohang Zhang, Tianle Cai, Zhou Lu, Di He, Liwei Wang | Published: 2021-02-10 | Updated: 2021-06-14
データセット評価
モデル性能評価
敵対的サンプル

$k$-Anonymity in Practice: How Generalisation and Suppression Affect Machine Learning Classifiers

Authors: Djordje Slijepčević, Maximilian Henzl, Lukas Daniel Klausner, Tobias Dam, Peter Kieseberg, Matthias Zeppelzauer | Published: 2021-02-09 | Updated: 2022-06-22
データセット評価
データ保護手法
モデル性能評価

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
ウォーターマーキング
データセット評価
トレーニングデータ抽出手法

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
データセット評価
侵入検知システム
攻撃の分類