Search Results - "Erfani, Sarah M."
-
1
High Intrinsic Dimensionality Facilitates Adversarial Attack: Theoretical Evidence
Published in IEEE transactions on information forensics and security (01-01-2021)“…Machine learning systems are vulnerable to adversarial attack. By applying to the input object a small, carefully-designed perturbation, a classifier can be…”
Get full text
Journal Article -
2
LabelGen: An Anomaly Label Generative Framework for Enhanced Graph Anomaly Detection
Published in IEEE access (2024)“…Anomaly detection in graphs is increasingly used to reveal fraud, fakes, security attacks and unusual behaviours in networks, such as social networks,…”
Get full text
Journal Article -
3
High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning
Published in Pattern recognition (01-10-2016)“…High-dimensional problem domains pose significant challenges for anomaly detection. The presence of irrelevant features can conceal the presence of anomalies…”
Get full text
Journal Article -
4
Hybrid Quantum-Classical Generative Adversarial Network for High-Resolution Image Generation
Published in IEEE transactions on quantum engineering (2023)“…Quantum machine learning (QML) has received increasing attention due to its potential to outperform classical machine learning methods in problems, such as…”
Get full text
Journal Article -
5
Adversarial Coreset Selection for Efficient Robust Training
Published in International journal of computer vision (01-12-2023)“…It has been shown that neural networks are vulnerable to adversarial attacks: adding well-crafted, imperceptible perturbations to their input can modify their…”
Get full text
Journal Article -
6
Efficient Unsupervised Parameter Estimation for One-Class Support Vector Machines
Published in IEEE transaction on neural networks and learning systems (01-10-2018)“…One-class support vector machines (OCSVMs) are very effective for semisupervised anomaly detection. However, their performance strongly depends on the settings…”
Get full text
Journal Article -
7
LN-SNE: Log-Normal Distributed Stochastic Neighbor Embedding for Anomaly Detection
Published in IEEE transactions on knowledge and data engineering (01-04-2020)“…We present a new unsupervised dimensionality reduction technique, called LN-SNE, for anomaly detection. LN-SNE generates a parametric embedding by means of…”
Get full text
Journal Article -
8
Online cluster validity indices for performance monitoring of streaming data clustering
Published in International journal of intelligent systems (01-04-2019)“…Cluster analysis is used to explore structure in unlabeled batch data sets in a wide range of applications. An important part of cluster analysis is validating…”
Get full text
Journal Article -
9
Towards quantum enhanced adversarial robustness in machine learning
Published in Nature machine intelligence (01-06-2023)“…Machine learning algorithms are powerful tools for data-driven tasks such as image classification and feature detection. However, their vulnerability to…”
Get full text
Journal Article -
10
Benchmarking adversarially robust quantum machine learning at scale
Published in Physical review research (01-06-2023)“…Machine learning (ML) methods such as artificial neural networks are rapidly becoming ubiquitous in modern science, technology, and industry. Despite their…”
Get full text
Journal Article -
11
Distributed Nonlinear Model Predictive Control and Reinforcement Learning
Published in 2019 Australian & New Zealand Control Conference (ANZCC) (01-11-2019)“…Coordinating two or more dynamic systems such as autonomous vehicles or satellites in a distributed manner poses an important research challenge. Multiple…”
Get full text
Conference Proceeding -
12
Fuzzy c-Shape: A new algorithm for clustering finite time series waveforms
Published in 2017 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) (01-07-2017)“…The existence of large volumes of time series data in many applications has motivated data miners to investigate specialized methods for mining time series…”
Get full text
Conference Proceeding -
13
Mining Rare Recurring Events in Network Traffic using Second Order Contrast Patterns
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18-07-2021)“…Data mining techniques such as contrast pattern mining provide a promising approach to detecting and characterizing changes in network traffic. However, a…”
Get full text
Conference Proceeding -
14
Neural Architecture Search via Combinatorial Multi-Armed Bandit
Published in 2021 International Joint Conference on Neural Networks (IJCNN) (18-07-2021)“…Neural Architecture Search (NAS) has gained significant popularity as an effective tool for designing high performance deep neural networks (DNNs). NAS can be…”
Get full text
Conference Proceeding -
15
Deep Learning and One-class SVM based Anomalous Crowd Detection
Published in 2019 International Joint Conference on Neural Networks (IJCNN) (01-07-2019)“…Anomalous event detection in videos is an important and challenging task. This paper proposes a deep representation approach to the problem, which extracts and…”
Get full text
Conference Proceeding -
16
Support vector machines resilient against training data integrity attacks
Published in Pattern recognition (01-12-2019)“…•Support Vector Machines are designed to withstand noise in data.•But they are vulnerable to integrity attacks by adversaries.•Projecting data to lower…”
Get full text
Journal Article -
17
Local Intrinsic Dimensionality Signals Adversarial Perturbations
Published in 2022 IEEE 61st Conference on Decision and Control (CDC) (06-12-2022)“…The vulnerability of machine learning models to adversarial perturbations has motivated a significant amount of research under the broad umbrella of…”
Get full text
Conference Proceeding -
18
Defending Support Vector Machines Against Data Poisoning Attacks
Published in IEEE transactions on information forensics and security (2021)“…Support Vector Machines (SVMs) are vulnerable to targeted training data manipulations such as poisoning attacks and label flips. By carefully manipulating a…”
Get full text
Journal Article -
19
Ensemble Fuzzy Clustering Using Cumulative Aggregation on Random Projections
Published in IEEE transactions on fuzzy systems (01-06-2018)“…Random projection is a popular method for dimensionality reduction due to its simplicity and efficiency. In the past few years, random projection and fuzzy…”
Get full text
Journal Article -
20
Robust and Accurate Short-Term Load Forecasting: A Cluster Oriented Ensemble Learning Approach
Published in 2019 International Joint Conference on Neural Networks (IJCNN) (01-07-2019)“…One of the most critical tasks for operating a power system is load forecasting in order to keep balance between demand and supply and for planning…”
Get full text
Conference Proceeding