Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3278505
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Fair ML Evaluations for Security

Abstract: If citing, it is advised that you check and use the publisher's definitive version for pagination, volume/issue, and date of publication details. And where the final published version is provided on the Research Portal, if citing you are again advised to check the publisher's website for any subsequent corrections.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
35
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(62 citation statements)
references
References 13 publications
(19 reference statements)
2
35
0
Order By: Relevance
“…The wrapper classes provided by the Keras library allow the usage of neural network models developed with Keras in scikit-learn. Also, there is a KerasClassifier class in Keras that can be used as an Estimator in scikit-learn ( Pendlebury et al, 2018 ). The KerasClassifier takes the name of a function as an argument.…”
Section: Methodsmentioning
confidence: 99%
“…The wrapper classes provided by the Keras library allow the usage of neural network models developed with Keras in scikit-learn. Also, there is a KerasClassifier class in Keras that can be used as an Estimator in scikit-learn ( Pendlebury et al, 2018 ). The KerasClassifier takes the name of a function as an argument.…”
Section: Methodsmentioning
confidence: 99%
“…In this example we focus on ML-based detection methods given their popularity within the academic community [8], [10], [15], [17], [18]. Researchers devise new techniques to extract features from Android apps and use those features to train ML models.…”
Section: A Motivating Examplementioning
confidence: 99%
“…On the one hand, researchers might dismiss promising detection approaches, because they underperform on a dataset that utilizes a labeling strategy that does not reflect the true nature of the apps in the dataset. On the other hand, developers of inadequate detection methods might get a false sense of confidence in the detection capabilities of their detection methods because they perform well, albeit using an inaccurate labeling strategy [15], [16].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the API design of TESSERACT is heavily inspired by and fully compatible with SCIKIT-LEARN [39] and KERAS [10]; as a result, many of the conventions and workflows in TESSERACT will be familiar to users of these libraries. Here we present an overview of the library's core modules while further details of the design can be found in [40].…”
Section: A5 Tesseract Implementationmentioning
confidence: 99%