Decision trees: from efficient prediction to responsible AI
This article provides a birds-eye view on the role of decision trees in machine learning and
data science over roughly four decades. It sketches the evolution of decision tree research …
data science over roughly four decades. It sketches the evolution of decision tree research …
[HTML][HTML] SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection
Abstract Machine Learning (ML) can be incredibly valuable to automate anomaly detection
and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is …
and cyber-attack classification, improving the way that Network Intrusion Detection (NID) is …
A model for predicting cervical cancer using machine learning algorithms
N Al Mudawi, A Alazeb - Sensors, 2022 - mdpi.com
A growing number of individuals and organizations are turning to machine learning (ML)
and deep learning (DL) to analyze massive amounts of data and produce actionable …
and deep learning (DL) to analyze massive amounts of data and produce actionable …
Logic-based explainability in machine learning
J Marques-Silva - … Knowledge: 18th International Summer School 2022 …, 2023 - Springer
The last decade witnessed an ever-increasing stream of successes in Machine Learning
(ML). These successes offer clear evidence that ML is bound to become pervasive in a wide …
(ML). These successes offer clear evidence that ML is bound to become pervasive in a wide …
Sok: Explainable machine learning for computer security applications
Explainable Artificial Intelligence (XAI) aims to improve the transparency of machine
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
learning (ML) pipelines. We systematize the increasingly growing (but fragmented) …
Towards adversarial realism and robust learning for IoT intrusion detection and classification
The internet of things (IoT) faces tremendous security challenges. Machine learning models
can be used to tackle the growing number of cyber-attack variations targeting IoT systems …
can be used to tackle the growing number of cyber-attack variations targeting IoT systems …
Adaptative perturbation patterns: Realistic adversarial learning for robust intrusion detection
Adversarial attacks pose a major threat to machine learning and to the systems that rely on
it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading …
it. In the cybersecurity domain, adversarial cyber-attack examples capable of evading …
Fast provably robust decision trees and boosting
Learning with adversarial robustness has been a challenge in contemporary machine
learning, and recent years have witnessed increasing attention on robust decision trees and …
learning, and recent years have witnessed increasing attention on robust decision trees and …
Robust optimal classification trees against adversarial examples
Decision trees are a popular choice of explainable model, but just like neural networks, they
suffer from adversarial examples. Existing algorithms for fitting decision trees robust against …
suffer from adversarial examples. Existing algorithms for fitting decision trees robust against …
Adversarial robustness for tabular data through cost and utility awareness
K Kireev, B Kulynych, C Troncoso - arXiv preprint arXiv:2208.13058, 2022 - arxiv.org
Many safety-critical applications of machine learning, such as fraud or abuse detection, use
data in tabular domains. Adversarial examples can be particularly damaging for these …
data in tabular domains. Adversarial examples can be particularly damaging for these …