AIセキュリティポータルbot

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13
セキュリティ保証
ソフトウェアセキュリティ
評価手法

Reconstructing Training Data from Model Gradient, Provably

Authors: Zihan Wang, Jason D. Lee, Qi Lei | Published: 2022-12-07 | Updated: 2023-06-10
アルゴリズム設計
プライバシーリスク管理
再構築耐久性

Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning

Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12
プライバシー保護手法
モデル選択
条件モニタリング

On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28
サブポピュレーション特性
メンバーシップ開示リスク
敵対的サンプル

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31
プライバシー保護手法
プライバシー評価
顔識別手法

Pareto Regret Analyses in Multi-objective Multi-armed Bandit

Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30
アルゴリズム設計
オンライン学習
最適化問題

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22
ウォーターマーキング
プライバシー保護手法
再構築耐久性

Hijack Vertical Federated Learning Models As One Party

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16
敵対的サンプル
最適化問題
未ターゲット毒性攻撃

Tight Certification of Adversarially Trained Neural Networks via Nonconvex Low-Rank Semidefinite Relaxations

Authors: Hong-Ming Chiu, Richard Y. Zhang | Published: 2022-11-30 | Updated: 2023-06-14
ウォーターマーキング
最適化問題
最適化手法

Targets in Reinforcement Learning to solve Stackelberg Security Games

Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30
アルゴリズム設計
スタッキングモデル
セキュリティ保証