AIセキュリティポータルbot

Adversarially Robust PAC Learnability of Real-Valued Functions

Authors: Idan Attias, Steve Hanneke | Published: 2022-06-26 | Updated: 2024-05-05
アルゴリズム設計
サンプリング手法
学習の改善

Malware Detection and Prevention using Artificial Intelligence Techniques

Authors: Md Jobair Hossain Faruk, Hossain Shahriar, Maria Valero, Farhat Lamia Barsha, Shahriar Sobhan, Md Abdullah Khan, Michael Whitman, Alfredo Cuzzocreak, Dan Lo, Akond Rahman, Fan Wu | Published: 2022-06-26
ネットワーク脅威検出
悪意のあるパッケージ検出
静的分析

Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

Authors: Sandhya Aneja, Nagender Aneja, Pg Emeroylariffion Abas, Abdul Ghani Naim | Published: 2022-06-25
アルゴリズム設計
学習の改善
敵対的攻撃手法

Using Autoencoders on Differentially Private Federated Learning GANs

Authors: Gregor Schram, Rui Wang, Kaitai Liang | Published: 2022-06-24
アルゴリズム設計
学習の改善
生成モデルの課題

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11
アルゴリズム設計
形式的検証
敵対的サンプル

“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning

Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11
アルゴリズム設計
パフォーマンス評価
プライバシー保護メカニズム

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25
アルゴリズム設計
深層学習技術
自己教師あり学習

LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks

Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23
侵入検知システム
深層学習手法
評価手法

A Framework for Understanding Model Extraction Attack and Defense

Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23
アルゴリズム設計
メンバーシップ推論
敵対的学習

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22
テスト優先順位付け
脆弱性分析
評価手法