AIセキュリティポータルbot

Adversarial Concept Drift Detection under Poisoning Attacks for Robust Data Stream Mining

Authors: Łukasz Korycki, Bartosz Krawczyk | Published: 2020-09-20
ドリフト検出手法
ポイズニング
敵対的攻撃検出

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20
性能評価
悪意のあるウェブサイト検出
情報セキュリティ

Early detection of the advanced persistent threat attack using performance analysis of deep learning

Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19
ネットワーク脅威検出
未知の攻撃検出
脆弱性管理

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

Authors: Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu | Published: 2020-09-19 | Updated: 2020-11-25
動的サービススケジューリング
敵対的サンプル
知識の蒸留

A Framework of Randomized Selection Based Certified Defenses Against Data Poisoning Attacks

Authors: Ruoxin Chen, Jie Li, Chentao Wu, Bin Sheng, Ping Li | Published: 2020-09-18 | Updated: 2020-10-13
ロバスト回帰
敵対的訓練
機械学習

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17
ウォーターマーキング
データ生成
メンバーシップ推論

On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17
メンバーシップ推論
機械学習
評価指標

Real-Time Anomaly Detection in Edge Streams

Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25
DDoS攻撃
データ生成
異常検出手法

Byzantine-Robust Variance-Reduced Federated Learning over Distributed Non-i.i.d. Data

Authors: Jie Peng, Zhaoxian Wu, Qing Ling, Tianyi Chen | Published: 2020-09-17 | Updated: 2021-08-28
ビザンチン耐性
分散学習
重み更新手法

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04
ゲーム理論
深層強化学習
脆弱性分析