| Active Anomaly Detection via Ensembles | Sep 17, 2018 | Active LearningAnomaly Detection | CodeCode Available | 1 |
| Robust Neural Malware Detection Models for Emulation Sequence Learning | Jun 28, 2018 | Computer SecurityMalware Classification | CodeCode Available | 0 |
| Non-deterministic Behavior of Ranking-based Metrics when Evaluating Embeddings | Jun 19, 2018 | Computer Security | —Unverified | 0 |
| Detecting Denial-of-Service Attacks from Social Media Text: Applying NLP to Computer Security | Jun 1, 2018 | Computer Security | —Unverified | 0 |
| Generative Models for Spear Phishing Posts on Social Media | Feb 14, 2018 | ClusteringComputer Security | —Unverified | 0 |
| Reservoir of Diverse Adaptive Learners and Stacking Fast Hoeffding Drift Detection Methods for Evolving Data Streams | Sep 7, 2017 | Computer SecurityDrift Detection | CodeCode Available | 0 |
| Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection | Aug 22, 2017 | Computer SecurityGraph Embedding | CodeCode Available | 0 |
| A Survey on Resilient Machine Learning | Jul 11, 2017 | BIG-bench Machine LearningBlocking | —Unverified | 0 |
| Adequacy of the Gradient-Descent Method for Classifier Evasion Attacks | Apr 6, 2017 | Computer Security | —Unverified | 0 |
| LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems | Nov 6, 2016 | Computer SecurityIntrusion Detection | —Unverified | 0 |
| Self-Organising Maps in Computer Security | Aug 5, 2016 | Anomaly DetectionComputer Security | —Unverified | 0 |
| Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification | Nov 13, 2015 | Computer SecurityGeneral Classification | CodeCode Available | 0 |
| Randomized LU decomposition: An Algorithm for Dictionaries Construction | Feb 17, 2015 | Computer SecurityFile Type Identification | —Unverified | 0 |
| Topic Modeling of Hierarchical Corpora | Sep 11, 2014 | Computer Security | —Unverified | 0 |
| Stratified Graphical Models - Context-Specific Independence in Graphical Models | Sep 25, 2013 | Computer Security | —Unverified | 0 |
| Immune System Approaches to Intrusion Detection - A Review (ICARIS) | May 30, 2013 | Computer SecurityIntrusion Detection | —Unverified | 0 |