機械学習の応用

Adversary-resilient Distributed and Decentralized Statistical Inference and Machine Learning: An Overview of Recent Advances Under the Byzantine Threat Model

Authors: Zhixiong Yang, Arpita Gang, Waheed U. Bajwa | Published: 2019-08-23 | Updated: 2020-06-02
合意形成アルゴリズム
機械学習の応用
非中央集権的処理

A Compendium on Network and Host based Intrusion Detection Systems

Authors: Rahul-Vigneswaran K, Prabaharan Poornachandran, Soman KP | Published: 2019-04-06
機械学習アルゴリズム
機械学習の応用
深層学習手法

A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment

Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05
データの起源と変遷
データ依存性
機械学習の応用

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
機械学習アルゴリズム
機械学習の応用
深層学習手法

White-to-Black: Efficient Distillation of Black-Box Adversarial Attacks

Authors: Yotam Gil, Yoav Chai, Or Gorodissky, Jonathan Berant | Published: 2019-04-04
敵対的攻撃
機械学習アルゴリズム
機械学習の応用

Active Learning for Network Intrusion Detection

Authors: Amir Ziai | Published: 2019-04-02
アクティブラーニング
データ前処理
機械学習の応用

Building an Efficient Intrusion Detection System Based on Feature Selection and Ensemble Classifier

Authors: Yuyang Zhou, Guang Cheng, Shanqing Jiang, Mian Dai | Published: 2019-04-02 | Updated: 2020-04-02
アンサンブル学習
機械学習の応用
評価指標

Deep Learning in steganography and steganalysis from 2015 to 2018

Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16
ステガノグラフィー手法
機械学習の応用
深層学習に基づくIDS

Tackling Android Stego Apps in the Wild

Authors: Wenhao Chen, Li Lin, Min Wu, Jennifer Newman | Published: 2018-08-01
データ漏洩
機械学習の応用
画像処理

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27
モデル評価
機械学習の応用
特徴選択手法