Search Results - "Erfani, Sarah M."

Refine Results
  1. 1

    High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence by Amsaleg, Laurent, Bailey, James, Barbe, Amelie, Erfani, Sarah M., Furon, Teddy, Houle, Michael E., Radovanovic, Milos, Nguyen, Xuan Vinh

    “…Machine learning systems are vulnerable to adversarial attack. By applying to the input object a small, carefully-designed perturbation, a classifier can be…”
    Get full text
    Journal Article
  2. 2

    LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection by Xia, Siqi, Rajasegarar, Sutharshan, Pan, Lei, Leckie, Christopher, Erfani, Sarah M., Chan, Jeffrey

    Published in IEEE access (2024)
    “…Anomaly detection in graphs is increasingly used to reveal fraud, fakes, security attacks and unusual behaviours in networks, such as social networks,…”
    Get full text
    Journal Article
  3. 3

    High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning by Erfani, Sarah M., Rajasegarar, Sutharshan, Karunasekera, Shanika, Leckie, Christopher

    Published in Pattern recognition (01-10-2016)
    “…High-dimensional problem domains pose significant challenges for anomaly detection. The presence of irrelevant features can conceal the presence of anomalies…”
    Get full text
    Journal Article
  4. 4

    Hybrid Quantum-Classical Generative Adversarial Network for High-Resolution Image Generation by Tsang, Shu Lok, West, Maxwell T., Erfani, Sarah M., Usman, Muhammad

    “…Quantum machine learning (QML) has received increasing attention due to its potential to outperform classical machine learning methods in problems, such as…”
    Get full text
    Journal Article
  5. 5

    Adversarial Coreset Selection for Efficient Robust Training by Dolatabadi, Hadi M., Erfani, Sarah M., Leckie, Christopher

    Published in International journal of computer vision (01-12-2023)
    “…It has been shown that neural networks are vulnerable to adversarial attacks: adding well-crafted, imperceptible perturbations to their input can modify their…”
    Get full text
    Journal Article
  6. 6

    Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines by Ghafoori, Zahra, Erfani, Sarah M., Rajasegarar, Sutharshan, Bezdek, James C., Karunasekera, Shanika, Leckie, Christopher

    “…One-class support vector machines (OCSVMs) are very effective for semisupervised anomaly detection. However, their performance strongly depends on the settings…”
    Get full text
    Journal Article
  7. 7

    LN-SNE: Log-Normal Distributed Stochastic Neighbor Embedding for Anomaly Detection by Ghafoori, Zahra, Erfani, Sarah M., Bezdek, James C., Karunasekera, Shanika, Leckie, Christopher

    “…We present a new unsupervised dimensionality reduction technique, called LN-SNE, for anomaly detection. LN-SNE generates a parametric embedding by means of…”
    Get full text
    Journal Article
  8. 8

    Online cluster validity indices for performance monitoring of streaming data clustering by Moshtaghi, Masud, Bezdek, James C., Erfani, Sarah M., Leckie, Christopher, Bailey, James

    “…Cluster analysis is used to explore structure in unlabeled batch data sets in a wide range of applications. An important part of cluster analysis is validating…”
    Get full text
    Journal Article
  9. 9

    Towards quantum enhanced adversarial robustness in machine learning by West, Maxwell T., Tsang, Shu-Lok, Low, Jia S., Hill, Charles D., Leckie, Christopher, Hollenberg, Lloyd C. L., Erfani, Sarah M., Usman, Muhammad

    Published in Nature machine intelligence (01-06-2023)
    “…Machine learning algorithms are powerful tools for data-driven tasks such as image classification and feature detection. However, their vulnerability to…”
    Get full text
    Journal Article
  10. 10

    Benchmarking adversarially robust quantum machine learning at scale by West, Maxwell T., Erfani, Sarah M., Leckie, Christopher, Sevior, Martin, Hollenberg, Lloyd C. L., Usman, Muhammad

    Published in Physical review research (01-06-2023)
    “…Machine learning (ML) methods such as artificial neural networks are rapidly becoming ubiquitous in modern science, technology, and industry. Despite their…”
    Get full text
    Journal Article
  11. 11

    Distributed Nonlinear Model Predictive Control and Reinforcement Learning by Saeed, Ifrah, Alpcan, Tansu, Erfani, Sarah M., Yilmaz, M. Berkay

    “…Coordinating two or more dynamic systems such as autonomous vehicles or satellites in a distributed manner poses an important research challenge. Multiple…”
    Get full text
    Conference Proceeding
  12. 12

    Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms by Fahiman, Fateme, Bezdek, James C., Erfani, Sarah M., Palaniswami, Marimuthu, Leckie, Christopher

    “…The existence of large volumes of time series data in many applications has motivated data miners to investigate specialized methods for mining time series…”
    Get full text
    Conference Proceeding
  13. 13

    Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns by Alipourchavary, Elaheh, Erfani, Sarah M., Leckie, Christopher

    “…Data mining techniques such as contrast pattern mining provide a promising approach to detecting and characterizing changes in network traffic. However, a…”
    Get full text
    Conference Proceeding
  14. 14

    Neural Architecture Search via Combinatorial Multi-Armed Bandit by Huang, Hanxun, Ma, Xingjun, Erfani, Sarah M., Bailey, James

    “…Neural Architecture Search (NAS) has gained significant popularity as an effective tool for designing high performance deep neural networks (DNNs). NAS can be…”
    Get full text
    Conference Proceeding
  15. 15

    Deep Learning and One-class SVM based Anomalous Crowd Detection by Yang, Meng, Rajasegarar, Sutharshan, Erfani, Sarah M., Leckie, Christopher

    “…Anomalous event detection in videos is an important and challenging task. This paper proposes a deep representation approach to the problem, which extracts and…”
    Get full text
    Conference Proceeding
  16. 16

    Support vector machines resilient against training data integrity attacks by Weerasinghe, Sandamal, Erfani, Sarah M., Alpcan, Tansu, Leckie, Christopher

    Published in Pattern recognition (01-12-2019)
    “…•Support Vector Machines are designed to withstand noise in data.•But they are vulnerable to integrity attacks by adversaries.•Projecting data to lower…”
    Get full text
    Journal Article
  17. 17

    Local Intrinsic Dimensionality Signals Adversarial Perturbations by Weerasinghe, Sandamal, Abraham, Tamas, Alpcan, Tansu, Erfani, Sarah M., Leckie, Christopher, Rubinstein, Benjamin I. P.

    “…The vulnerability of machine learning models to adversarial perturbations has motivated a significant amount of research under the broad umbrella of…”
    Get full text
    Conference Proceeding
  18. 18

    Defending Support Vector Machines Against Data Poisoning Attacks by Weerasinghe, Sandamal, Alpcan, Tansu, Erfani, Sarah M., Leckie, Christopher

    “…Support Vector Machines (SVMs) are vulnerable to targeted training data manipulations such as poisoning attacks and label flips. By carefully manipulating a…”
    Get full text
    Journal Article
  19. 19

    Ensemble Fuzzy Clustering Using Cumulative Aggregation on Random Projections by Rathore, Punit, Bezdek, James C., Erfani, Sarah M., Rajasegarar, Sutharshan, Palaniswami, Marimuthu

    Published in IEEE transactions on fuzzy systems (01-06-2018)
    “…Random projection is a popular method for dimensionality reduction due to its simplicity and efficiency. In the past few years, random projection and fuzzy…”
    Get full text
    Journal Article
  20. 20

    Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach by Fahiman, Fateme, Erfani, Sarah M., Leckie, Christopher

    “…One of the most critical tasks for operating a power system is load forecasting in order to keep balance between demand and supply and for planning…”
    Get full text
    Conference Proceeding