AIセキュリティポータルbot

Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis

Authors: Brian Coyle, Mina Doosti, Elham Kashefi, Niraj Kumar | Published: 2020-12-21
損失関数
機械学習の応用
量子暗号解析

FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism

Authors: Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang | Published: 2020-12-19
インセンティブメカニズム
メンバーシップ推論
機械学習の応用

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

Authors: Runhua Xu, James Joshi, Chao Li | Published: 2020-12-18 | Updated: 2021-04-18
データ保護手法
トレーニングデータ抽出手法
暗号化プロトコル

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31
バックドア攻撃
ポイズニング
モデル保護手法

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18
ウォーターマーキング
データセット評価
トレーニングデータ抽出手法

Learning from History for Byzantine Robust Optimization

Authors: Sai Praneeth Karimireddy, Lie He, Martin Jaggi | Published: 2020-12-18 | Updated: 2021-06-29
ビザンチン合意メカニズム
動的ビザンチン行動
重み更新手法

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17
データセット評価
侵入検知システム
攻撃の分類

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21
データセット評価
攻撃検出
機械学習の役割

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16
MLベースのIDS
機械学習の応用
環境の複雑性

Optimized Random Forest Model for Botnet Detection Based on DNS Queries

Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16
DDoS攻撃
機械学習の応用
防御手法