AIセキュリティポータルbot

Nonsmooth Implicit Differentiation: Deterministic and Stochastic Convergence Rates

Authors: Riccardo Grazzi, Massimiliano Pontil, Saverio Salzo | Published: 2024-03-18 | Updated: 2024-06-04
収束保証
収束分析
最適化問題

Semantic Data Representation for Explainable Windows Malware Detection Models

Authors: Peter Švec, Štefan Balogh, Martin Homola, Ján Kľuka, Tomáš Bisták | Published: 2024-03-18
ウォーターマーキング
データセット生成
マルウェア分類

Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
トレーニングデータ抽出手法
モデル性能評価
階層的分類手法

CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17
Few-Shot Learning
マルウェア分類
動的に新しいクラスを識別する手法

A Dual-Tier Adaptive One-Class Classification IDS for Emerging Cyberthreats

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
侵入検知システム
未知の攻撃検出
階層的分類手法

usfAD Based Effective Unknown Attack Detection Focused IDS Framework

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
DDoS攻撃検出
侵入検知システム
未知の攻撃検出

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption

Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17
トレーニングプロトコル
プライバシー保護手法
連合学習

QuantumLeak: Stealing Quantum Neural Networks from Cloud-based NISQ Machines

Authors: Zhenxiao Fu, Min Yang, Cheng Chu, Yilun Xu, Gang Huang, Fan Chen | Published: 2024-03-16
ウォーターマーキング
モデル抽出攻撃
量子フレームワーク

Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency

Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15
ウォーターマーキング
バックドア攻撃
ポイズニング

A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks

Authors: Beatrice Casey, Joanna C. S. Santos, George Perry | Published: 2024-03-15
ウォーターマーキング
プログラム解析
メンバーシップ推論