Computer Systems Have 99 Problems, Let's Not Make Machine Learning Another One
暂无分享,去创建一个
[1] Aziz Mohaisen,et al. Crime Scene Reconstruction: Online Gold Farming Network Analysis , 2017, IEEE Transactions on Information Forensics and Security.
[2] Wan Choi,et al. ShmCaffe: A Distributed Deep Learning Platform with Shared Memory Buffer for HPC Architecture , 2018, 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS).
[3] Leonardo Babun,et al. Verifying Internet of Things Safety and Security in Physical Spaces , 2019, IEEE Security & Privacy.
[4] DIMITRIOS PIERRAKOS,et al. User Modeling and User-Adapted Interaction , 1994, User Modeling and User-Adapted Interaction.
[5] Geoffrey I. Webb,et al. # 2001 Kluwer Academic Publishers. Printed in the Netherlands. Machine Learning for User Modeling , 1999 .
[6] Patrick D. McDaniel,et al. Adversarial Examples for Malware Detection , 2017, ESORICS.
[7] Mehdi Bennis,et al. Toward Low-Latency and Ultra-Reliable Virtual Reality , 2018, IEEE Network.
[8] Matthew Lease,et al. On Quality Control and Machine Learning in Crowdsourcing , 2011, Human Computation.
[9] Murat Yuksel,et al. Training network administrators in a game-like environment , 2015, J. Netw. Comput. Appl..
[10] Atul Prakash,et al. Robust Physical-World Attacks on Deep Learning Visual Classification , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.
[11] Aziz Mohaisen,et al. Capturing DDoS Attack Dynamics Behind the Scenes , 2015, DIMVA.
[12] Michael I. Jordan,et al. Machine learning: Trends, perspectives, and prospects , 2015, Science.
[13] Aziz Mohaisen,et al. Android Malware Detection Using Complex-Flows , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[14] Amit Kumar Sikder,et al. A Context-Aware Framework for Detecting Sensor-Based Threats on Smart Devices , 2019, IEEE Transactions on Mobile Computing.
[15] Raheem A. Beyah,et al. SOTA: Secure Over-the-Air Programming of IoT Devices , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).
[16] David Slater,et al. Malicious Behavior Detection using Windows Audit Logs , 2015, AISec@CCS.
[17] Jiliang Zhang,et al. ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples , 2018, 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS).
[18] Joongheon Kim,et al. Thriving on chaos: Proactive detection of command and control domains in internet of things-scale botnets using DRIFT , 2019, Trans. Emerg. Telecommun. Technol..
[19] Aziz Mohaisen,et al. XLF: A Cross-layer Framework to Secure the Internet of Things (IoT) , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
[20] Aziz Mohaisen,et al. An Adversary-Centric Behavior Modeling of DDoS Attacks , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[21] Aziz Mohaisen,et al. COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection , 2019, ArXiv.
[22] Engin Ipek,et al. Dynamic Multicore Resource Management: A Machine Learning Approach , 2009, IEEE Micro.
[23] Aziz Mohaisen,et al. Analyzing and Detecting Emerging Internet of Things Malware: A Graph-Based Approach , 2019, IEEE Internet of Things Journal.
[24] Dawn Song,et al. Robust Physical-World Attacks on Deep Learning Models , 2017, 1707.08945.
[25] Zheng Zhang,et al. MXNet: A Flexible and Efficient Machine Learning Library for Heterogeneous Distributed Systems , 2015, ArXiv.
[26] Murat Yuksel,et al. Large-Scale Network Parameter Configuration Using an On-Line Simulation Framework , 2008, IEEE/ACM Transactions on Networking.
[27] Aziz Mohaisen,et al. A Survey on Deep Packet Inspection for Intrusion Detection Systems , 2008, ArXiv.
[28] Yi Lu Murphey,et al. Intelligent Vehicle Power Control Based on Machine Learning of Optimal Control Parameters and Prediction of Road Type and Traffic Congestion , 2009, IEEE Transactions on Vehicular Technology.
[29] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[30] Aziz Mohaisen,et al. Examining the Robustness of Learning-Based DDoS Detection in Software Defined Networks , 2019, 2019 IEEE Conference on Dependable and Secure Computing (DSC).
[31] Aziz Mohaisen,et al. Adversarial Learning Attacks on Graph-based IoT Malware Detection Systems , 2019, 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).